News

Observability is security’s way back into the cloud conversation

Observability is security’s way back into the cloud conversation 2025-04-08 at 08:02 By Mirko Zorz In this Help Net Security interview, Esteban Gutierrez, CISO and VP of Information Security at New Relic, discusses how the adoption of cloud infrastructure is outpacing security readiness. He shares strategies for overcoming common misconfigurations and optimizing access controls in […]

React to this headline:

Loading spinner

Observability is security’s way back into the cloud conversation Read More »

Phishing, fraud, and the financial sector’s crisis of trust

Phishing, fraud, and the financial sector’s crisis of trust 2025-04-08 at 08:02 By Anamarija Pogorelec The financial sector is under growing pressure from advanced phishing attacks and fraud, causing major financial losses and eroding customer trust. Escalation of phishing attacks While traditional phishing relied on generic emails to steal sensitive data, cybercriminals now use targeted

React to this headline:

Loading spinner

Phishing, fraud, and the financial sector’s crisis of trust Read More »

Cyberattacks on water and power utilities threaten public safety

Cyberattacks on water and power utilities threaten public safety 2025-04-08 at 07:33 By Help Net Security 62% of utility operators were targeted by cyberattacks in the past year, and of those, 80% were attacked multiple times, according to Semperis. 54% suffered permanent corruption or destruction of data and systems. (Source: Semperis) Utilities face rising cyber

React to this headline:

Loading spinner

Cyberattacks on water and power utilities threaten public safety Read More »

Cybersecurity jobs available right now: April 8, 2025

Cybersecurity jobs available right now: April 8, 2025 2025-04-08 at 07:00 By Anamarija Pogorelec Application Security Engineer (DevSecOps & VAPT) Derisk360 | India | On-site – View job details As an Application Security Engineer (DevSecOps & VAPT), you will integrate security into CI/CD pipelines, conduct vulnerability assessments and penetration testing, and use tools like SonarCloud

React to this headline:

Loading spinner

Cybersecurity jobs available right now: April 8, 2025 Read More »

WinRAR MotW bypass flaw fixed, update ASAP (CVE-2025-31334)

WinRAR MotW bypass flaw fixed, update ASAP (CVE-2025-31334) 2025-04-07 at 14:36 By Zeljka Zorz WinRAR users, upgrade your software as soon as possible: a vulnerability (CVE-2025-31334) that could allow attackers to bypass Windows’ Mark of the Web (MotW) security warning and execute arbitrary code on your machine has been fixed in version 7.11. About CVE-2025-31334

React to this headline:

Loading spinner

WinRAR MotW bypass flaw fixed, update ASAP (CVE-2025-31334) Read More »

CISOs battle security platform fatigue

CISOs battle security platform fatigue 2025-04-07 at 08:31 By Mirko Zorz It starts with good intentions. A tool to stop phishing. Another to monitor endpoints. One more for cloud workloads. Soon, a well-meaning CISO finds themselves managing dozens of products across teams, each with its own dashboard, alerts, and licensing headaches. Welcome to the age

React to this headline:

Loading spinner

CISOs battle security platform fatigue Read More »

The shift to identity-first security and why it matters

The shift to identity-first security and why it matters 2025-04-07 at 08:10 By Mirko Zorz In this Help Net Security interview, Arun Shrestha, CEO at BeyondID, discusses how AI is transforming secure access management for both attackers and defenders. He discusses the shift toward identity-first security, and the role of contextual and continuous authentication in

React to this headline:

Loading spinner

The shift to identity-first security and why it matters Read More »

YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection

YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection 2025-04-07 at 07:35 By Mirko Zorz YES3 Scanner is an open-source tool that scans and analyzes 10+ different configuration items for your S3 buckets in AWS. This includes access such as public access via ACLs and bucket policies – including the complex combinations of

React to this headline:

Loading spinner

YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection Read More »

The rise of compromised LLM attacks

The rise of compromised LLM attacks 2025-04-07 at 07:03 By Help Net Security In this Help Net Security video, Sohrob Kazerounian, Distinguished AI Researcher at Vectra AI, discusses how the ongoing rapid adoption of LLM-based applications has already introduced new cybersecurity risks. These vulnerabilities will not be in the LLM itself, but rather in how

React to this headline:

Loading spinner

The rise of compromised LLM attacks Read More »

Week in review: Probing activity on Palo Alto Networks GlobalProtect portals, Patch Tuesday forecast

Week in review: Probing activity on Palo Alto Networks GlobalProtect portals, Patch Tuesday forecast 2025-04-06 at 11:02 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are probing Palo Alto Networks GlobalProtect portals Cybersecurity company GreyNoise is warning about a significant increase of scanning

React to this headline:

Loading spinner

Week in review: Probing activity on Palo Alto Networks GlobalProtect portals, Patch Tuesday forecast Read More »

April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft

April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft 2025-04-04 at 08:50 By Help Net Security Microsoft is continuing to build on their AI cybersecurity strategy and this month announced the introduction of new agents in Microsoft Security Copilot. They are introducing agents for phishing triage, alert triage for data loss prevention and

React to this headline:

Loading spinner

April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft Read More »

Forward-thinking CISOs are shining a light on shadow IT

Forward-thinking CISOs are shining a light on shadow IT 2025-04-04 at 08:32 By Mirko Zorz In this Help Net Security interview, Curtis Simpson, CISO and Chief Advocacy Officer at Armis, discusses how CISOs can balance security and innovation while managing the risks of shadow IT. Rather than focusing on restrictive policies, fostering proactive partnerships with

React to this headline:

Loading spinner

Forward-thinking CISOs are shining a light on shadow IT Read More »

Connected cars drive into a cybersecurity crisis

Connected cars drive into a cybersecurity crisis 2025-04-04 at 08:18 By Help Net Security Technology has entered all areas of life, and our cars are no exception. They have become computers on wheels, equipped with sensors, software, and connectivity that provide safety and comfort. However, like all technological innovations, this one also brings risks, making

React to this headline:

Loading spinner

Connected cars drive into a cybersecurity crisis Read More »

Benefits from privacy investment are greater than the cost

Benefits from privacy investment are greater than the cost 2025-04-04 at 08:02 By Help Net Security Cisco released its 2025 Data Privacy Benchmark Study. The report looks at global trends in data privacy and how they affect businesses. The study gathered responses from 2,600 privacy and security experts in 12 countries. It highlights the need

React to this headline:

Loading spinner

Benefits from privacy investment are greater than the cost Read More »

Inside the AI-driven threat landscape

Inside the AI-driven threat landscape 2025-04-04 at 07:35 By Help Net Security In this Help Net Security video, Nick Barter, Chief Strategy Officer at Nothreat, discusses how AI is no longer just a tool for defenders, it’s now a powerful weapon in the hands of attackers. With the adoption of generative AI, cyber threats are

React to this headline:

Loading spinner

Inside the AI-driven threat landscape Read More »

New infosec products of the week: April 4, 2025

New infosec products of the week: April 4, 2025 2025-04-04 at 07:28 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from 1touch.io, Bitsight, Bluefin, CyberQP, and Exabeam. Exabeam Nova accelerates threat detection and response By correlating multiple detections within a case and using a proprietary

React to this headline:

Loading spinner

New infosec products of the week: April 4, 2025 Read More »

Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)

Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457) 2025-04-03 at 21:01 By Zeljka Zorz A suspected Chinese APT group has exploited CVE-2025-22457 – a buffer overflow bug that was previously thought not to be exploitable – to compromise appliances running Ivanti Connect Secure (ICS) 22.7R2.5 or earlier or Pulse Connect Secure 9.1x. The vulnerability

React to this headline:

Loading spinner

Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457) Read More »

Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)

Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439) 2025-04-03 at 16:15 By Zeljka Zorz CVE-2024-20439, a static credential vulnerability in the Cisco Smart Licensing Utility, is being exploited by attackers in the wild, CISA has confirmed on Monday by adding the flaw to its Known Exploited Vulnerabilities catalog. Cisco has followed up

React to this headline:

Loading spinner

Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439) Read More »

Strengthening Healthcare Security: Navigating HIPAA’s Latest Cybersecurity Requirements

Strengthening Healthcare Security: Navigating HIPAA’s Latest Cybersecurity Requirements 2025-04-03 at 16:02 By Don White Understand the Upcoming HIPAA Changes: Get a clear breakdown of the 2025 HIPAA Security Rule updates and what they mean for healthcare providers and business associates. Strengthen Cybersecurity Resilience: Learn how the new regulations emphasize cyber resilience, requiring proactive measures like

React to this headline:

Loading spinner

Strengthening Healthcare Security: Navigating HIPAA’s Latest Cybersecurity Requirements Read More »

Phishers are increasingly impersonating electronic toll collection companies

Phishers are increasingly impersonating electronic toll collection companies 2025-04-03 at 14:31 By Zeljka Zorz Steam was the most imitated brands by phishers in the first quarter of 2025, followed by Microsoft and Facebook/Meta, Guardio researchers have revealed. “Historically, the #1 spot has been dominated by the usual suspects – big tech companies like Meta, Microsoft,

React to this headline:

Loading spinner

Phishers are increasingly impersonating electronic toll collection companies Read More »

Scroll to Top