Category: HelpnetSecurity

How to map and manage your cyber attack surface with EASM
02
Apr
2025

How to map and manage your cyber attack surface with EASM

In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate…

Utimaco releases Quantum Protect solution
02
Apr
2025

Utimaco releases Quantum Protect solution

Utimaco launched Quantum Protect, the Post Quantum Cryptography application package for its u.trust General Purpose HSM (Hardware Security Modules) Se-Series….

Google is making sending end-to-end encrypted emails easy
02
Apr
2025

Google is making sending end-to-end encrypted emails easy

Sending end-to-end encrypted (E2EE) emails from Gmail enterprise accounts is about to become much easier than it is now, Google…

North Korean IT workers set their sights on European organizations
02
Apr
2025

North Korean IT workers set their sights on European organizations

North Korean IT workers are expanding their efforts beyond the US, and are seeking to fraudulently gain employment with organizations…

Exabeam Nova accelerates threat detection and response
02
Apr
2025

Exabeam Nova accelerates threat detection and response

Exabeam unveiled Exabeam Nova, an autonomous AI agent delivering actionable intelligence that enables security teams to respond faster to incidents,…

Only 1% of malicious emails that reach inboxes deliver malware
02
Apr
2025

Only 1% of malicious emails that reach inboxes deliver malware

99% of email threats reaching corporate user inboxes in 2024 were response-based social engineering attacks or contained phishing links, according…

Balancing data protection and clinical usability in healthcare
02
Apr
2025

Balancing data protection and clinical usability in healthcare

In this Help Net Security interview, Aaron Weismann, CISO at Main Line Health, discusses the growing ransomware threat in healthcare…

BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework
02
Apr
2025

BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework

BlueToolkit is an open-source tool that helps find security flaws in Bluetooth Classic devices. It runs known and custom exploits…

Your smart home may not be as secure as you think
02
Apr
2025

Your smart home may not be as secure as you think

The Internet of Things (IoT) has become a major part of daily life. Smartphones, smart thermostats, security cameras, and other…

Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
01
Apr
2025

Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)

Exploitation attempts targeting the CVE-2025-2825 vulnerability on internet-facing CrushFTP instances are happening, the Shadowserver Foundation has shared on Monday, and…

Building a reasonable cyber defense program
01
Apr
2025

Building a reasonable cyber defense program

If you do business in the United States, especially across state lines, you probably know how difficult it is to…

Why global tensions are a cybersecurity problem for every business
01
Apr
2025

Why global tensions are a cybersecurity problem for every business

With global tensions climbing, cyber attacks linked to nation-states and their allies are becoming more common, sophisticated, and destructive. For…