News

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference 2025-05-04 at 10:47 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 Conference RSAC 2025 Conference took place at the Moscone Center in San Francisco. Check out our microsite for related news, […]

React to this headline:

Loading spinner

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference Read More »

Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)

Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221) 2025-05-02 at 16:18 By Zeljka Zorz Attackers have been using two previously known vulnerabilities (CVE-2024-38475, CVE-2023-44221) to compromise Sonicwall secure mobile access devices, the vendor has confirmed by updating the associated advisories. CISA has added the two flaws to its Known Exploited Vulnerabilities catalog,

React to this headline:

Loading spinner

Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221) Read More »

AI and automation shift the cybersecurity balance toward attackers

AI and automation shift the cybersecurity balance toward attackers 2025-05-02 at 09:02 By Help Net Security Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security.

React to this headline:

Loading spinner

AI and automation shift the cybersecurity balance toward attackers Read More »

Phone theft is turning into a serious cybersecurity risk

Phone theft is turning into a serious cybersecurity risk 2025-05-02 at 08:35 By Sinisa Markovic Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat. In the UK alone, the Metropolitan Police recovers 1,000 phones each week. Stolen phones don’t just go to local black

React to this headline:

Loading spinner

Phone theft is turning into a serious cybersecurity risk Read More »

People know password reuse is risky but keep doing it anyway

People know password reuse is risky but keep doing it anyway 2025-05-02 at 08:16 By Help Net Security 35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of

React to this headline:

Loading spinner

People know password reuse is risky but keep doing it anyway Read More »

Half of red flags in third-party deals never reach compliance teams

Half of red flags in third-party deals never reach compliance teams 2025-05-02 at 07:32 By Help Net Security Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance teams reliably, according to Gartner. The post Half of red flags in

React to this headline:

Loading spinner

Half of red flags in third-party deals never reach compliance teams Read More »

Infosec products of the month: April 2025

Infosec products of the month: April 2025 2025-05-02 at 07:03 By Sinisa Markovic Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Abnormal AI, AppViewX, Arctic Wolf Networks, Bitdefender, BitSight, Bugcrowd, Cato Networks, CyberQP, Cyware, Entrust, Exabeam, Flashpoint, Forescout, Index Engines, Jit, LastPass, PlexTrac, PowerDMARC, RunSafe Security, Saviynt,

React to this headline:

Loading spinner

Infosec products of the month: April 2025 Read More »

Trustwave Takes Home SC Trust Award for Best Managed Security Service

Trustwave Takes Home SC Trust Award for Best Managed Security Service 2025-05-02 at 01:41 By Doug Olenick SC Media calls out Trustwave’s ability to maximize the value of their Microsoft Security tools for clients. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave Takes Home SC Trust Award for Best Managed Security Service Read More »

Photos: RSAC 2025, part 2

Photos: RSAC 2025, part 2 2025-05-01 at 16:31 By Help Net Security RSAC 2025 Conference is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this gallery takes you inside the event. The first gallery is here. The featured vendors are: Tines, Thales, Sumo Logic, N-able, Google, ExtraHop, Cy4Data

React to this headline:

Loading spinner

Photos: RSAC 2025, part 2 Read More »

Why SMEs can no longer afford to ignore cyber risk

Why SMEs can no longer afford to ignore cyber risk 2025-05-01 at 09:32 By Mirko Zorz In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small and medium-sized businesses (SMEs) must reassess their risk exposure and prioritize resilience to safeguard their long-term growth and stability.

React to this headline:

Loading spinner

Why SMEs can no longer afford to ignore cyber risk Read More »

Preparing for the next wave of machine identity growth

Preparing for the next wave of machine identity growth 2025-05-01 at 09:21 By Mirko Zorz Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how automation can help, and

React to this headline:

Loading spinner

Preparing for the next wave of machine identity growth Read More »

Hottest cybersecurity open-source tools of the month: April 2025

Hottest cybersecurity open-source tools of the month: April 2025 2025-05-01 at 08:36 By Help Net Security This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source OSINT tool for uncovering digital footprints GoSearch is an open-source OSINT tool built to uncover digital footprints linked to

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: April 2025 Read More »

Top solutions to watch after RSAC 2025

Top solutions to watch after RSAC 2025 2025-05-01 at 08:03 By Help Net Security RSAC 2025 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in identity protection, this year’s conference delivered a glimpse into the future. Here are the most interesting products that caught our

React to this headline:

Loading spinner

Top solutions to watch after RSAC 2025 Read More »

Online fraud peaks as breaches rise

Online fraud peaks as breaches rise 2025-05-01 at 07:31 By Help Net Security Data breaches played a key role in significant financial losses faced by consumers due to fraud. In this Help Net Security video, Steve Yin, Global Head of Fraud at TransUnion, and Brad Daughdrill, VP, Data Science, Head of Global Fraud Analytics, TransUnion,

React to this headline:

Loading spinner

Online fraud peaks as breaches rise Read More »

Low-tech phishing attacks are gaining ground

Low-tech phishing attacks are gaining ground 2025-05-01 at 07:02 By Help Net Security Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based on an analysis of global real-world data and highlights the most significant email security trends from the first quarter of 2025. Callback

React to this headline:

Loading spinner

Low-tech phishing attacks are gaining ground Read More »

Photos: RSAC 2025

Photos: RSAC 2025 2025-04-30 at 16:31 By Help Net Security RSAC 2025 Conference is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this gallery takes you inside the event. The featured vendors are: PowerDMARC, Skyhawk Security, ThreatLocker, Stellar Cyber, Center for Internet Security, PlexTrac, ISC2, Bitdefender, SentinelOne, and

React to this headline:

Loading spinner

Photos: RSAC 2025 Read More »

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities 2025-04-30 at 16:31 By Zeljka Zorz Vulnerabilities in Apple’s AirPlay Protocol, AirPlay Software Development Kits (SDKs), and the CarPlay Communication Plug-in could allow attackers to compromise AirPlay-enabled devices developed and sold by Apple and by other companies. “Because AirPlay is a fundamental piece of software for Apple

React to this headline:

Loading spinner

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities Read More »

Download: Edgescan 2025 Vulnerability Statistics Report

Download: Edgescan 2025 Vulnerability Statistics Report 2025-04-30 at 16:03 By Help Net Security Edgescan’s 2025 Vulnerability Statistics Report explores risk density patterns across network/device and application layers, uncovers complex vulnerabilities that automated tools consistently miss, and evaluates the real-world effectiveness of leading vulnerability scoring methodologies, including EPSS, CISA KEV, CVSS, and our proprietary EVSS system.

React to this headline:

Loading spinner

Download: Edgescan 2025 Vulnerability Statistics Report Read More »

Property renters targeted in simple BEC scam

Property renters targeted in simple BEC scam 2025-04-30 at 14:32 By Zeljka Zorz Emails purportedly sent by rental property management firms are being used to steal money from people in France and Canada, Proofpoint researchers have warned. A BEC scam preying on renters “Most campaigns are sent from compromised mailboxes belonging to educational institutions in

React to this headline:

Loading spinner

Property renters targeted in simple BEC scam Read More »

Scroll to Top