Tuesday, September 30, 2025

My Favorite Amazon Deal of the Day: This Amazon Echo Frames and Echo Spot Bundle

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding my work at Lifehacker as a preferred source.


Early Prime Day deals have started, and you can find many Amazon devices with record-low prices, including Kindle readers, all leading up to October Prime Day. One of these deals worth highlighting is the Amazon Echo Frames + Echo Spot bundle, currently going for $119.99 (originally $229.99), the lowest price it has been, according to price-tracking tools.

The third-generation Echo Frames are the latest to be released this summer. They work like open-ear headphones that let you hear your surroundings, with the frames projecting sound to your ears. This can be good or bad, depending on your intended use. If you want to focus on your media in loud environments like a busy coffee shop, they might not work great. But if you are in a more controlled environment like an office or home, being able to hear when someone talks to you is a necessity.

The bundle also brings the Echo Spot, which is normally $79.99 and is the latest smart speaker with Alexa built in, and the Echo Frames normally run for $269.99, so being able to get both of these products for $119.99 is a steal.

The Echo Frames feel like regular glasses (or sunglasses). The standout features are the excellent microphone and well-balanced mids and highs, according to PCMag's review. Keep in mind, though, like most open-ear headphones, the bass is very weak.

You can wear these out to work out if you want, since they are water and sweat-resistant. Keep in mind this price does not include the cost of your prescription lenses. But you can get the prescription-ready configuration with lenses meant to be swapped out by your optometrist.


Our Best Editor-Vetted Tech Deals Right Now
Apple iPad 11" 128GB A16 WiFi Tablet (Blue, 2025) $319.00 (List Price $349.00)
Ring Battery Doorbell Plus $79.99 (List Price $149.99)
Ring Indoor Cam (2nd Gen, 2-pack, White) $49.98 (List Price $79.99)
Amazon Fire TV Stick 4K (2nd Gen, 2023) $24.99 (List Price $49.99)
Amazon Fire HD 10 (2023) $69.99 (List Price $139.99)
Deals are selected by our commerce team

from Lifehacker https://ift.tt/snXI0P2

This Amazon Fire Bundle Is Nearly 40% Off Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

As far as tablets go, the Amazon Fire Max 11 is a well-designed crowd-pleaser with a large, vibrant display. Right now, you can get it for 38% off as part of the Amazon Fire Max 11 Productivity Bundle, which includes a keyboard case and stylus pen that transforms it into a fully functional laptop complete with essential accessories for design, studying, and everyday use. 

The tablet features an 11-inch display certified for low blue light with a 2000 × 1200 pixel resolution and 410 nits of brightness, making it bright enough to use in sunny conditions. It has 4 GB of memory, dual-band Wi-Fi 6 (but not 6E), and 64 GB of storage. The octa-core processor is improved and more efficient than that of previous Fire tablets. The 7,500mAh battery lasts around 14 hours, but according to this PCMag review, it takes close to four hours to charge and lasts around eight hours with constant video streaming at maximum brightness.

According to the listing, the aluminum body is three times as durable as the iPad 10.9-inch (10th generation) as measured in tumble tests, and the design with slim, rounded corners makes it both sleek and ergonomic to hold. The  Fire Max 11 can capture 1080p video, and the PCMag reviews mention that the 8 MP cameras (one on the front, and another on the back, which has auto-focus) are suitable for video calls and basic snapshots, but they can’t compete with smartphones. 

While tablets like the iPad and Samsung Galaxy Tab might have stronger hardware and more mature app ecosystems (you don’t get Google Play), with the included keyboard and stylus, the Amazon Fire Max 11 Productivity Bundle delivers a total package at a comparatively low price point. Beyond included accessories, its strengths lie in the large LCD display, decent hardware for the price, respectable performance, and overall value—especially for those who are already in the Amazon ecosystem.

Our Best Editor-Vetted Tech Deals Right Now
Apple iPad 11" 128GB A16 WiFi Tablet (Blue, 2025) $319.00 (List Price $349.00)
Ring Battery Doorbell Plus $79.99 (List Price $149.99)
Ring Indoor Cam (2nd Gen, 2-pack, White) $49.98 (List Price $79.99)
Amazon Fire TV Stick 4K (2nd Gen, 2023) $24.99 (List Price $49.99)
Amazon Fire HD 10 (2023) $69.99 (List Price $139.99)
Deals are selected by our commerce team

from Lifehacker https://ift.tt/TqyV1KF

This Ring Spotlight Camera With Solar Panel Is at Its Lowest Price Ever Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding Lifehacker as a preferred source for tech news.


Battery-powered cameras are convenient until you realize how often they need recharging. That’s where the Ring Spotlight Cam Pro Solar Bundle, now $199.98 on Amazon (down from $289.98), makes sense. The included solar panel keeps the battery topped up, even through stretches of cloudy weather, so you don’t have to climb up a ladder every few weeks. At this price—the lowest it’s ever been, according to price trackers—you’re getting both the camera and the panel in one box, which covers power, monitoring, and lighting in a single package.

The camera itself is one of Ring’s more advanced models. It records sharp HDR video at 2K resolution with a wide field of view and offers color night vision when the spotlights kick on. Reviewers note the footage looks crisp, and two-way audio is clear enough for conversations. Ring also adds extras like 3D motion detection and Bird’s Eye View, which maps out the path of movement on your property. Combined with instant alerts, you can see not just that someone approached your yard but exactly where they walked. Bright built-in spotlights act as a deterrent and make night recordings more useful than standard infrared-only clips. The system integrates easily with Alexa and has a long list of IFTTT automations for third-party gear, but it doesn’t support Google Assistant or Apple HomeKit.

That said, there are caveats worth considering. Out of the box, you get live view and motion alerts, but most of the smarter features require a Ring Home subscription. The Basic Plan, at $4.99 per month, unlocks video history, person detection, and the ability to share or download clips. Without it, you’ll lose stored footage once the included 30-day free trial ends. The solar panel also isn’t the most subtle piece of hardware, so it may stand out if mounted in front of your house. And while setup is straightforward through the Ring app, the bundle’s price is still higher than many competing solar cameras. That said, if you want to minimize battery charging and prefer a system that’s easy to install and manage, this deal brings a premium package to its lowest cost yet.


Our Best Editor-Vetted Tech Deals Right Now
Apple iPad 11" 128GB A16 WiFi Tablet (Blue, 2025) $319.00 (List Price $349.00)
Ring Battery Doorbell Plus $79.99 (List Price $149.99)
Ring Indoor Cam (2nd Gen, 2-pack, White) $49.98 (List Price $79.99)
Amazon Fire TV Stick 4K (2nd Gen, 2023) $24.99 (List Price $49.99)
Amazon Fire HD 10 (2023) $69.99 (List Price $139.99)
Deals are selected by our commerce team

from Lifehacker https://ift.tt/QrWlzNw

CISA says it will fill the gap as some federal funding for MS-ISAC dries up

The cooperative agreement between the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the not-for-profit Center for Internet Security is ending today, the agency has announced on Monday, and CISA will take it upon itself to offer support to US state, local, tribal, and territorial (SLTT) governments by way of grants, tools, and cybersecurity expertise.

CISA MS-ISAC funding

MS-ISAC funding cut leaves core services intact but trims key support

The Center for Internet Security (CIS) runs the Multi-State Information Sharing and Analysis Center (MS-ISAC), whose mission is to “improve the overall cybersecurity posture of SLTT government organizations through coordination, collaboration, cooperation, and increased communication.”

It provides 24x7x365 cyber threat intelligence and incident response assistance; cybersecurity tools and services; reports and advisories; access to an annual cybersecurity self-assessment to review organizations’ cybersecurity maturity; and more.

MS-ISAC was, until recently, partially funded by the U.S. federal government through the above mentioned cooperative agreement administered by CISA. Unfortunately, on March 6, that funding has been partially cut.

“The federal government cancelled funding to ten categories of work affecting MS-ISAC operations, including cyber threat analysis and threat distribution, incident response services, a wide range of member onboarding and account management support, and outreach activities including webinars, training, and virtual and in-person meetings,” MS-ISAC explained.

MS-ISAC’s security operation center will continue to be partially funded by the U.S. government, and so will:

  • The operation of the Malicious Domain Blocking and Reporting (MDBR) service
  • The annual cybersecurity self-assessment (NCSR) program, and
  • The network security monitoring capabilities and services provided through Albert intrusion detection sensors.

Cyber support for local governments enters uncertain phase

“CISA will continue to collaborate with the Multi-State Information Sharing and Analysis Center (MS-ISAC) on information sharing and joint products, consistent with its engagement across the broader ISAC community. SLTT partners that use Albert sensors should continue to coordinate directly with CIS/MS-ISAC for that service,” the Agency has noted.

But SLTT governments should now turn to CISA for cybersecurity grants from the Department of Homeland Security (DHS), free services and tools for vulnerability management, phishing assessments, and more, as well as (regional) expert advice, incident response coordination help, and cyber defense updates via bi-monthly SLTT SOC calls.

“The Center for Internet Security has been informed that the DHS and CISA have chosen not to renew federal funding that for the past 20 years has supported the MS-ISAC’s highly effective work to increase the security resilience for SLTT organizations,” John Gilligan, President and CEO of CIS, told Help Net Security.

“The MS-ISAC, operated by CIS, has been this nation’s most successful public-private partnership. While we are disappointed by this decision, as a nonprofit and nonpartisan organization, CIS remains committed to the SLTT community.”

While CIS has been temporarily funding the continuation of cybersecurity services from their own pocket, the situation is untenable, and it will try to get the $1+ million per month needed for those operations through a new fee-based membership model.

“We are expecting to implement a membership model for core services and a fee-for-service model for non-core services. During this interim period there may be limited disruptions to various MS-ISAC offerings due to shifting priorities or funding constraints,” CIS noted on its website.

With CISA having already suffered budget and workforce cuts, and a potential lapse in funding if the federal government shuts down this week, the cybersecurity of the systems “that keep America running” is by no means assured.

The fact that the Cybersecurity Information Sharing Act of 2025 is expiring this month and there’s currently no indication that it will be reauthorized by the US Congress is just another potential nail in the coffin.

Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!


from Help Net Security https://ift.tt/9V1BdEm

Monday, September 29, 2025

TikTok’s ‘Cozy Cardio’ Trend Might Help You Enjoy Exercise Again

Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding my work at Lifehacker as a preferred source.


My omnipotent social media algorithms know I'm a sucker for trendy fitness content. What's interesting about today's fitness influencers is they sound nothing like the boot camp battle cries of the past decade. Quite the opposite, really. Instead of "no pain, no gain," think soft lighting, cozy socks, and your favorite comfort show playing in the background. Welcome to "Cozy Cardio"—TikTok's antidote to workout burnout.

"Cozy cardio" is all about prioritizing comfort and enjoyment over intensity and intimidation. If you've ever felt like traditional fitness culture wasn't for you, this gentler philosophy might be exactly what you need to rediscover the joy of moving your body.

What is cozy cardio?

Picture this: You're in your softest sweatpants, a candle is flickering nearby, your favorite show is queued up, and you're walking on a treadmill or pedaling on a stationary bike—not to hit a specific target or beat a personal record, but simply to move. At its core, the "cozy" in cozy cardio is about creating a low-pressure, comfortable environment for low-impact cardiovascular exercise.

This trend began with TikTok creator Hope Zuckerbrow back in 2022, who coined the term when she started posting her early-morning cardio routines. It regularly crops up again and again, with creators sharing their relaxed workout setups, complete with mood lighting, comforting beverages, and zero pressure to push past their limits. The message behind all these video is that if you feel alienated by high-intensity workout culture, well, get cozy with it.

Celebrity trainer Kollins Ezekh sees a clear reason for its popularity: "I think it's taking off because it makes working out feel less like a chore. For years, fitness was pushed as 'go hard or go home.' Cozy Cardio flips that—it's about moving your body in a way that feels good, not punishing. People can finally picture themselves enjoying the process, and that's powerful."

Why cozy cardio might work for you

Traditional fitness culture often frames exercise as something you must endure—a punishment for eating dessert or a means to "earn" your rest. This creates a negative association with movement, making it feel like one more demanding item on an endless to-do list.

What I love about cozy cardio is that it reframes exercise as self-care rather than self-correction. By pairing movement with comforting elements, it becomes something you actually look forward to—a peaceful ritual, rather than an obligation.

Ezekh emphasizes the importance of environment in this shift: "The atmosphere matters. If you dim the lights, light a candle, or throw on your favorite show while you move, it creates a calming routine. You're still getting the endorphins from exercise, but the cozy setting tells your body to relax. It turns a workout into something that helps you decompress instead of adding more stress to your day."

Personally, I've found low-impact cardio still delivers in terms of mental benefits. And this is coming from someone who loves already high-intensity cardio. But it's regular walking, light cycling, or gentle movement that seriously boosts my mood and reduces stress. Plus, it comes without the joint strain or exhaustion that I risk with my high-intensity training.

How to create your own cozy cardio routine

Ready to embrace this kinder approach to fitness? Here's how to build a cozy cardio practice that actually sticks.

Set the mood: Transform your workout space into a sanctuary. Dim the overhead lights or use lamps for softer illumination. Light a candle with your favorite scent. Play calming music, an engaging podcast, or binge-worthy television. The goal is to create an environment where you feel relaxed and at ease, not on edge or pressured.

Choose comfortable movement: Select low-impact activities that feel sustainable: walking on a treadmill, using a stationary bike, stepping in place, gentle dancing, or using an under-desk elliptical. The intensity should feel manageable—you should be able to hold a conversation while moving.

Dress for comfort: Forget restrictive athletic wear if it doesn't serve you. Wear your softest loungewear, favorite oversized hoodie, or whatever makes you feel cozy. The only requirement is that your clothing allows you to move freely.

Start small and build consistency. Ezekh advises keeping expectations realistic: "Keep it simple—walk on a treadmill while watching Netflix, hop on a bike with a podcast, or do light movement in the evening instead of scrolling your phone. Even 10–15 minutes goes a long way. Results come from consistency, not punishment, and cozy cardio makes it easier to show up again and again."

Make it a ritual: Designate a specific time for your cozy cardio session. Perhaps first thing in the morning with coffee, during your lunch break, or as an evening wind-down. When it becomes a predictable, pleasant part of your routine, you're more likely to maintain it.

Remove the pressure: Let go of tracking every metric. You don't need to monitor your heart rate, count calories burned, or beat yesterday's performance. If you feel like going for twenty minutes instead of thirty, that's perfectly fine. The point is to move in a way that feels nurturing, not demanding.

The bottom line

Personally, I'm a huge fan of this sort of cultural shift in how we approach wellness. It acknowledges that not everyone thrives in competitive fitness environments, that movement shouldn't feel punitive, and that exercise is most sustainable when it's actually enjoyable.

This trend is particularly valuable for people who are rebuilding their relationship with movement after injury, illness, burnout, or disordered exercise patterns. It offers an entry point that feels safe and accessible, removing the intimidation factor that keeps many people from starting at all.

Of course, cozy cardio isn't meant to replace all forms of exercise. Those who enjoy high-intensity workouts or competitive sports should absolutely continue those pursuits. But for the countless people who have struggled to maintain a consistent exercise routine because traditional fitness culture felt overwhelming or uninviting, this gentler approach offers a genuine alternative.

The fitness industry has long operated on the assumption that motivation comes from pushing harder, going faster, and doing more. Cozy cardio suggests something different: that sometimes, the most powerful motivation comes from making movement feel like something you don't want to miss—because it's become the most peaceful, comforting part of your day.

In a world that constantly demands more from us, there's something quietly revolutionary about a fitness trend that asks for less—less intensity, less pressure, less punishment—and offers more: more enjoyment, more sustainability, and more compassion toward yourself. So dim those lights, turn on your favorite show, and give yourself permission to move gently.


from Lifehacker https://ift.tt/BuLI8C5

Nothing’s Next Release Is These Budget Over-Ear Headphones

We may earn a commission from links on this page.

Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding my work at Lifehacker as a preferred source.


CMF, the budget-friendly sub-brand from Nothing, has launched its first pair of over-ear headphones. At $99, the CMF Headphone Pro are Nothing's answer to fans looking for an affordable alternative to the popular Headphone 1 (which will cost you $299). Though Nothing has a reputation for odd-looking tech, the CMF Headphone Pros look a little more traditional, but also appear to be highly customizable, potentially making them a better value overall.

Here's what we know now about how the CMF Headphone Pros compare.

What the CMF Headphone Pros offer

Today's launch marks the release of CMF's first over-ear headphone, designed to integrate seamlessly with the broader Nothing/CMF ecosystem that includes smartphones, watches, and other audio products.

The design includes a round power and Bluetooth button on one side, paired with a customizable action button on the other that can be programmed through the Nothing X app. There's more room for customization via $25 replacement ear cushions, available in vibrant orange or light green, allowing you to dramatically alter the headphones' appearance to match your mood or style.

The standout control feature is the multi-function roller on one side, with an "Energy Slider" on the other. The multi-function roller handles volume adjustment, playback control, and ambient sound, while the Energy Slider allows you to tune your sound in real-time, instantly adjusting the treble and bass balance. Normally you'd have to dive into your headphone app's EQ settings to get that sort of control. As someone who always prefers tactile controls over sensitive touch-screens, I'm particularly excited by this design.

And as you'd hope to find in a quality pair of over-ear headphones, the Headphone Pro has Adaptive Active Noise Cancellation (ANC) to block ambient noise. Perhaps most impressive is the battery life: allegedly, these headphones will offer a staggering 100 hours of playback on a single charge (reduced to up to 50 hours with ANC turned on). That's 15 more hours than you’ll get from the Headphone 1 with ANC active, and much better performance than the highly rated Sony WH-1000XM6, which top out at 40 hours.

The bottom line

This is a promising product launch from Nothing. The CMF sub-brand appeals to budget-conscious segment of the market while still delivering on the aesthetic and technical appeal that drew fans to Nothing in the first place.

The CMF Headphone Pro launches today in the EU and UK, but eager US customers do have to face a brief wait until Oct. 7 to get their hands on a pair. Whether these headphones will satisfy fans who have been requesting a more affordable option remains to be seen, but on paper, they appear to deliver exactly what was asked for: Nothing's design philosophy and build quality at a price that won't break the bank.


from Lifehacker https://ift.tt/8fxckVn

Akira ransomware: From SonicWall VPN login to encryption in under four hours

Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their systems, Arctic Wolf researchers have warned.

Armed with SonicWall SSL VPN credentials stolen in earlier intrusions and apparently able to bypass multi-factor authentication (MFA), the attackers:

  • Start to scan the network to discover network services and unsecured accounts
  • Use Impacket to set up and interact with SMB sessions
  • Use RDP for lateral movement through compromised environments
  • Find their way to a Domain Controller and gain access to virtual machine storage and backups
  • Create additional accounts (including domain accounts) to install RMM tools and for data exfiltration
  • Establish a C2 method
  • Collect and exfiltrate data
  • Disable legitimate RMM tools and EDR tools, delete System Volume Shadow Service copies, clear event logs
  • Install WinRAR to archive data that will be exfiltrated via rclone or FileZilla to a virtual private server (VPS) they control
  • Deploy the Akira ransomware.

Initial access

Arctic Wolf has been warning about the increase of Akira ransomware attacks since July 2025.

At first, it appeared the attackers might be exploiting a zero-day in SonicWall VPN devices, but it was later confirmed they were abusing CVE-2024-40766, an improper access control flaw in SonicWall SonicOS management access and SSL VPN.

A fix for CVE-2024-40766 was released by SonicWall in August 2024 but, according to the company, some customers have upgraded from Gen 6 to Gen 7 firewalls without resetting passwords for local user accounts with SSL VPN access.

The prevailing theory is that these actors harvested SSL VPN and privileged service account credentials months earlier during quieter intrusions. They are now reusing those credentials to breach organizations that may have patched or upgraded, but never rotated local user passwords.

Rapid7 researchers have also suggested that attackers are exploiting additional weaknesses, including:

  • A misconfiguration in SonicWall devices’ SSLVPN Default Users Group setting, which automatically adds every successfully authenticated LDAP user to a predefined local group that may have access to sensitive services
  • Externally accessible Virtual Office Portal inside the SonicOS management interface, which allows them to configure one-time password (OTP) multi-factor authentication on compromised accounts.

“In our investigation, we observed repeated malicious SSL VPN logins on accounts with OTP MFA enabled, ruling out scratch code usage in those cases. We also found no signs of malicious use of the compromised accounts prior to SSL VPN login (event ID 1080), nor did we observe unauthorized OTP unbinding events or other malicious configuration changes (event ID 1382) in the five days leading up to the intrusions,” Arctic Wolf researchers noted.

“Taken together, the evidence points to the use of valid credentials rather than modification of OTP configuration, though the exact method of authenticating against MFA-enabled accounts remains unclear.”

So far, there’s no indication that these intrusions and the attack against SonicWall’s cloud backup service for firewalls are related.

Advice for organizations

Victim organizations span multiple industries and vary in size, which points to the attacks being opportunistic rather than targeted.

The extraordinarily short time between initial access and ransomware deployment means that early detection and response are crucial.

The researchers advise organizations to:

  • Monitor for or, if possible, block logins from VPS hosting providers
  • Monitor for anomalous SMB activity that points to Impacket use and for LDAP discovery activity
  • Monitor for execution of network scanning tools and archival tools from unusual locations on servers
  • Use App Control for Business to block unauthorized remote tools, deny execution from untrusted paths, etc.

“If your SonicWall devices have previously run firmware versions vulnerable to CVE-2024-40766, we strongly recommend resetting all credentials stored on the firewall, including SSL VPN passwords and OTP MFA secrets,” Arctic Wolf researchers added.

“This includes both local firewall accounts and LDAP-synchronised Active Directory accounts, especially where accounts have access to SSL VPN. Threat actors are abusing these credentials even when devices are fully patched, suggesting that credential theft may have occurred earlier in the lifecycle. Resetting LDAP synchronisation accounts is especially critical, as we have observed logins against these accounts despite them not being intended for VPN access.”

Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!


from Help Net Security https://ift.tt/8wteIbA

Apple Might Be Working on an Update to Solve Some iOS 26 Problems

Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding my work at Lifehacker as a preferred source.


It's an exciting time to be an iPhone user. There's iOS 26, of course, which brings a number of major changes to the platform. For the daring, there's the iOS 26.1 beta, which continues to build upon the foundation of Apple's latest OS. If that weren't enough, however, it seems Apple is also working on yet another iPhone update—this time intended mostly to fix problems with the last one.

The update, iOS 26.0.1, could drop any time in the coming days. These types of updates aren't necessarily unusual: Apple released iOS 18.0.1 three weeks after iOS 18 last year. The intention here is not to introduce new features or add changes; rather, you should notice bugs fixed and less instability.

Per MacRumors, we may see four key bugs squashed with iOS 26.0.1. Those could include the following:

  • A patch for a bug affected the iPhone 17 Pro and iPhone Air's cameras

  • A patch for a bug that causes wifi to disconnect and reconnect on the iPhone 17 series. Reportedly, this bug can also disconnect CarPlay in some cars.

  • A patch for a bug that affects search in the Calendar app.

  • A patch for a bug that stops some users from downloading Apple Intelligence models on the iPhone 17 series.

This is not an exhaustive list by any means. We won't know exactly what Apple has planned for 26.0.1 until the update comes out. It's possible there will be other bugs patched here, as well as security updates not included in this list.

You usually can tell how monumental an Apple update is by the numbers in its name: An update like iOS 26, a round number, indicates a major, one a year update; an update like iOS 26.1, with one decimal, denotes a minor update that still introduces new features; and an update like iOS 26.0.1, with two decimals, indicates a stability or security update.

When Apple does release iOS 26.0.1, you can install it from Settings > General > Software Update.


from Lifehacker https://ift.tt/p4uiBms

The CISO’s guide to stronger board communication

In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs can communicate with the board, overcome common pitfalls such as overly technical language, and position cybersecurity as a business enabler rather than a cost center. He also examines the impact of AI as a transformative tool and a potential threat and how it is reshaping … More

The post The CISO’s guide to stronger board communication appeared first on Help Net Security.


from Help Net Security https://ift.tt/q2D1fAG

Cybersecurity leaders underreport cyber incidents to executives

Cyberattacks are becoming more frequent and severe, with 71% of surveyed security leaders saying attacks have grown more common in the past year and 61% reporting greater impact when incidents occur, according to a new report from VikingCloud.

cyberattacks frequency impact

Nation-state attacks move to the forefront

Nearly 80% of surveyed security leaders said they are concerned about being targeted by a nation-state attack within the next year. The study shows how geopolitical tensions are fueling activity that no longer hits only government or critical infrastructure. Software supply chain compromises are spilling into industries like retail, healthcare, and hospitality.

Respondents see government pullbacks on cybersecurity oversight as a factor that compounds this exposure. More than three-quarters believe cuts to agencies such as CISA and NSA have already made their organizations more vulnerable. Many companies now face well-funded, persistent attackers without the benefit of advance warning or support. These hackers focus on long-term access, IP theft, and espionage, and they infiltrate by exploiting third-party software vulnerabilities. Many are leveraging AI to scale their attacks.

AI shapes both attacks and defenses

Attackers are leveraging generative and agentic AI to scale phishing, social engineering, and ransomware campaigns. Most leaders suspect AI was used in the attacks they experienced last year, and nearly seven in ten admit they are confident in defending against these tactics in real time. Deepfakes, voice-based fraud, and prompt injection against AI models are all on the rise.

At the same time, organizations are turning to AI to strengthen their defenses. Nearly all respondents said they are using AI to automate tasks such as threat detection, identity management, and patching. The goal is to free up security teams for threat hunting and strategic risk management. Even with these efforts, 68% of leaders admit they are confident in their ability to defend against AI-driven threats in real time.

“Many cybersecurity teams have moved beyond simply bracing for impact,” said Kevin Pierce, President and Chief Operating Officer at VikingCloud. “They’re taking a proactive stance, and that shift will define the next phase of cyber resilience.”

Insider threats persist

Insider threats continue to be a major challenge. Over a third of respondents said more than a quarter of their incidents were tied to insiders, whether through mistakes or malicious actions. This problem grows with organizational size, as more locations, endpoints, and users expand the attack surface.

Training is the most common response to insider risks. More than half of companies expanded employee awareness programs in the past year, with an increase in education on AI-related threats.

Cyberattacks are underreported

The findings show that internal reporting of incidents is often incomplete. Nearly half of surveyed leaders admitted they did not share material breaches with their executive team or board. Among those, 22% concealed five or more incidents.

The reasons range from fear of punitive responses to worries about reputational damage and regulatory consequences. Whatever the motivation, the outcome is the same. Leaders are making decisions without understanding their risk exposure. This underreporting creates a false sense of resilience that can collapse when a serious breach occurs.

Shifts in strategy and spending

More companies are investing in cyber budgets, with one-third increasing spending compared to just 7% the year before. Hiring is up, and many organizations are leaning on managed security providers to extend coverage and consolidate tools.

The reliance on outside partners has doubled in a year, with two-thirds of companies now using managed services in some form.


from Help Net Security https://ift.tt/jARWVUT

Sunday, September 28, 2025

Top 10 fastest growing ICT jobs

AI is reshaping the workforce in ways that security leaders cannot ignore. The AI Workforce Consortium’s new report, ICT in Motion: The Next Wave of AI Integration, provides a look at how AI is changing job roles and skills across G7 economies. The findings point to risks and opportunities in building teams that can handle the security, ethics, and governance challenges of AI adoption.

AI ICT workforce

Top 10 fastest growing ICT jobs (G7 country aggregate) (Source: Cisco)

AI skills integration transforms job functions

The Consortium, which includes Cisco and other major technology companies, looked at 50 job roles across ICT and support functions. They found that AI is no longer limited to a few specialists. It is becoming a basic skill needed across the workforce. From software development and data science to cybersecurity, infrastructure, and management, AI skills integration is redefining job functions, workflows, and expectations.

This shift is driven by the adoption of AI tools, automation platforms, and intelligent agents that demand new technical proficiency. Many of the fastest-growing jobs are now centered on AI, such as AI/ML Engineer, NLP Engineer, and AI Risk and Governance Specialist.

The acceleration of agentic AI systems, capable of independent decision-making, is one reason for this shift. These tools are driving new security and compliance requirements. Organizations are finding that without staff who understand AI security and governance, they cannot deploy these systems at scale.

Security skills under pressure

Research shows that demand for AI technical skills is now integrated into 50 job roles across all career levels, contributing to a skills deficit throughout G7 economies.

The market does not yet supply enough professionals with these capabilities. LLMs, LLM Architecture, Prompt Engineering, Conversational AI, and Generative AI are identified to have the highest demand growth rate among AI skills and required immediate skills learning interventions to cater to job market demand.

The demand for AI Governance and AI Ethics skills are growing exponentially, further widening the gap between the supply of qualified professionals and the needs of employers. These shortages directly affect an organization’s ability to secure AI systems against misuse and align them with regulatory expectations.

In-demand human skills

The report also reinforces that technical training alone will not solve the problem. Human skills are increasing in importance. Communication, critical thinking, and leadership are in higher demand across ICT roles. For security teams, this translates into a need for staff who can explain AI risks to business leaders, collaborate across functions, and apply ethical reasoning in complex scenarios.

AI adoption is not only about technical defense. It is also about trust. Workers who can combine technical security knowledge with human-centric skills will be best positioned to manage AI responsibly.

“As AI reshapes our world and work, people remain at the center,” said Francine Katsoudas, Chief People, Policy & Purpose Officer, Cisco. “This year’s report shows that AI skills open exciting new doors, but it’s the combination of technical expertise and human strengths like collaboration and leadership that will truly shape a brighter future. We are committed to building a workforce that is ready for this new era of growth, and to give people everywhere the opportunity to learn, contribute and benefit.”

Hotspots for AI skills

The strongest AI job growth is happening in established tech hubs such as Silicon Valley, London, and Toronto. Emerging centers like Manchester, Lyon, and Vancouver are also gaining ground. This regional clustering shapes where talent is most available and where competition for AI security professionals will be most intense.

Understanding these labor market dynamics can help security leaders decide where to focus hiring efforts, partnerships, and training programs.

Leading the security response

The Consortium calls for businesses to take a skills-first approach. For security leaders, this means investing in AI-focused learning and development. Teams need structured training in AI risk, governance, and technical defense, along with career pathways that connect early exposure to AI tools with advanced governance roles.

The report suggests using frameworks like “Build, Buy, Borrow, Bot” to align workforce strategies with business needs. Applied to security, this can mean developing some skills internally, hiring for others, building partnerships to fill gaps, and using automation for routine monitoring tasks.


from Help Net Security https://ift.tt/Xfi1alN

Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk

Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

How Juventus protects fans, revenue, and reputation during matchdays
In this Help Net Security interview, Mirko Rinaldini, Head of ICT at Juventus Football Club, discusses the club’s approach to cyber risk strategy. Juventus has developed a threat-led, outcomes-driven program that balances innovation with protections across matchdays, e-commerce, and digital platforms.

Review: Practical Purple Teaming
Practical Purple Teaming is a guide to building stronger collaboration between offensive and defensive security teams. The book focuses on how to design and run effective purple team exercises that improve detection and response and strengthen trust between teams.

Building a stronger SOC through AI augmentation
In this Help Net Security interview, Tim Bramble, Director of Threat Detection and Response at OpenText, discusses how SOC teams are gaining value from AI in detecting and prioritizing threats. By learning what “normal” looks like across users and systems, AI helps surface anomalies that rules-based methods often miss.

Unpatched Fortra GoAnywhere instances at risk of full takeover (CVE-2025-10035)
If you’re running Fortra’s GoAnywhere managed file transfer solution and you haven’t updated to the latest available version for a while, do so now or risk getting your instance compromised via CVE-2025-10035.

Malicious GitHub pages lure MacOS users into installing Atomic infostealer
MacOS users looking to download popular software such as LastPass, 1Password, After Effects, Gemini, and many others are in danger of getting saddled with the Atomic infostealer instead, LastPass has warned.

SonicWall adds rootkit removal capabilities to the SMA 100 series
SonicWall has released new firmware for its Secure Mobile Access (SMA) 100 series appliances, adding file-checking capabilities that help users remove known rootkit malware.

After Shai-Hulud, GitHub tightens npm publishing security
Attackers are constantly finding ways to take over accounts and push malicious packages to the npm registry, the (GitHub-operated) online repository for JavaScript and Node.js packages.

Kali Linux 2025.3 brings improved virtual machine tooling, 10 new tools
OffSec has released Kali Linux 2025.3, the most up-to-date version of its popular penetration testing and digital forensics platform.

Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689)
Suspected state-sponsored attackers have exploited a zero-day vulnerability (CVE-2025-59689) in the Libraesva Email Security Gateway (ESG), the Italian email security company has confirmed.

SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399)
SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular web-based IT ticketing and asset management solution.

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks
A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been revealed by the US, UK, Canadian and Australian cybersecurity agencies.

Cybercriminals are going after law firms’ sensitive client data
Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been more at risk. Cybercriminals are targeting law firms by exploiting vulnerabilities, weak passwords, outdated systems, and untrained staff.

U.S. Secret Service takes down network of devices threatening government officials
The U.S. Secret Service has broken up a network of electronic devices spread across the New York tristate area that officials say posed an imminent threat to national security. The devices were being used to launch telecommunications attacks and to send threats targeting senior government officials.

The fight to lock down drones and their supply chains
Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological capabilities, we need to be aware of the risks they bring.

Cybersecurity AI (CAI): Open-source framework for AI security
Cybersecurity AI (CAI) is an open-source framework that helps security teams build and run AI-driven tools for offensive and defensive tasks. It’s designed for anyone working in security, including researchers, ethical hackers, IT staff, and organizations that want to use AI to find vulnerabilities, test defenses, and improve their security.

New framework sets baseline for SaaS security controls
Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own settings, permissions, and logs, and most third-party risk processes only look at the vendor’s overall security, not the app itself. That leaves gaps you have to close on your own, often with limited visibility and extra work for both your team and procurement.

Cisco fixes IOS/IOS XE zero-day exploited by attackers (CVE-2025-20352)
Cisco has fixed 14 vulnerabilities in IOS and IOS XE software, among them CVE-2025-20352, a high-severity vulnerability that has been exploited in zero-day attacks.

Microsoft spots LLM-obfuscated phishing attack
Cybercriminals are increasingly using AI-powered tools and (malicious) large language models to create convincing, error-free emails, deepfakes, online personas, lookalike/fake websites, and malware. More recently, Microsoft Threat Intelligence spotted and blocked an attack campaign delivering an LLM-obfuscated malicious attachment.

European Windows 10 users get an additional year of free security updates
Windows 10 users in the European Economic Area (EEA) will be able to receive extended security updates until October 14, 2026, without having to pay for them or to back up their settings, apps, or credentials to the Microsoft cloud.

AI needs ethics to avoid real-world harm
In this Help Net Security video, Brittany Allen, Senior Trust and Safety Architect at Sift, explores how the rise of AI agents is creating new fraud risks. She explains how these agents, while designed to assist users, can unintentionally help fraudsters by carrying out tasks without recognizing malicious intent.

Building AI responsibly from day one
In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of ethics and safety in AI development.

How agentic AI is changing the SOC
In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC). He explains what agentic AI is, how it can enhance cybersecurity workflows by automating repetitive tasks, and why accountability and careful implementation are critical.

Gartner: Preemptive cybersecurity to dominate 50% of security spend by 2030
By 2030, preemptive cybersecurity solutions will account for 50% of IT security spending, up from less than 5% in 2024, replacing standalone detection and response (DR) solutions as the preferred approach to defend against cyberthreats, according to Gartner.

Nosey Parker: Open-source tool finds sensitive information in textual data and Git history
Nosey Parker is an open-source command-line tool that helps find secrets and sensitive information hidden in text files. It works like a specialized version of grep, focused on spotting things like passwords, API keys, and other confidential data.

APIs and hardware are under attack, and the numbers don’t look good
Attackers have a new favorite playground, and it’s not where many security teams are looking. According to fresh data from Bugcrowd, vulnerabilities in hardware and APIs are climbing fast, even as website flaws hold steady. The shift shows how attackers are adapting to infrastructure, going after the hidden systems that keep businesses running.

Cybersecurity jobs available right now: September 23, 2025
We’ve scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now.

Infosec products of the month: September 2025
Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Blackdot Solutions, Catchpoint, Cynomi, DataLocker, Gigamon, Lookout, Nagomi Security, Neon Cyber, QuSecure, Relyance AI, Secure Code Warrior, and Teleport.


from Help Net Security https://ift.tt/YHJqjKw