Category: HelpnetSecurity

Top solutions to watch after RSAC 2025
01
May
2025

Top solutions to watch after RSAC 2025

RSAC 2025 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs…

Low-tech phishing attacks are gaining ground
01
May
2025

Low-tech phishing attacks are gaining ground

Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based…

Download: Edgescan 2025 Vulnerability Statistics Report
30
Apr
2025

Download: Edgescan 2025 Vulnerability Statistics Report

Edgescan’s 2025 Vulnerability Statistics Report explores risk density patterns across network/device and application layers, uncovers complex vulnerabilities that automated tools…

Photos: RSAC 2025 - Help Net Security
30
Apr
2025

Photos: RSAC 2025 – Help Net Security

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this…

Airplay-enabled devices open to attack via "AirBorne" vulnerabilities
30
Apr
2025

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities

Vulnerabilities in Apple’s AirPlay Protocol, AirPlay Software Development Kits (SDKs), and the CarPlay Communication Plug-in could allow attackers to compromise…

Property renters targeted in simple BEC scam
30
Apr
2025

Property renters targeted in simple BEC scam

Emails purportedly sent by rental property management firms are being used to steal money from people in France and Canada,…

Legit leverages AI in ASPM platform to find, fix, and prevent vulnerabilities
30
Apr
2025

Legit leverages AI in ASPM platform to find, fix, and prevent vulnerabilities

Legit Security has unveiled new functionalities that leverage AI to help security teams more quickly shore up gaps in their…

Arkose Labs launches Edge and Scraping Protection to secure enterprise digital borders
30
Apr
2025

Arkose Labs launches Edge and Scraping Protection to secure enterprise digital borders

Arkose Labs has announced the expansion of its security portfolio with two new offerings: Arkose Edge and Arkose Scraping Protection….

Saviynt ISPM provides insights into an organization’s identity and access posture
30
Apr
2025

Saviynt ISPM provides insights into an organization’s identity and access posture

Saviynt launched AI-powered Identity Security Posture Management (ISPM) as part of its converged Identity Cloud platform. Saviynt’s ISPM provides actionable…

Product showcase: Ledger Flex secure crypto wallet
30
Apr
2025

Product showcase: Ledger Flex secure crypto wallet

The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features…

Mobile security is a frontline risk. Are you ready?
30
Apr
2025

Mobile security is a frontline risk. Are you ready?

The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices…

Villain: Open-source framework for managing and enhancing reverse shells
30
Apr
2025

Villain: Open-source framework for managing and enhancing reverse shells

Villain is an open-source Stage 0/1 command-and-control (C2) framework designed to manage multiple reverse TCP and HoaxShell-based shells. Beyond simply…