Category: HelpnetSecurity

Lemony mitigates privacy and compliance risks associated with cloud-based AI
12
Jun
2025

Lemony mitigates privacy and compliance risks associated with cloud-based AI

Lemony announced its on-premise artificial intelligence solution that is redefining how organizations deploy generative AI. Lemony’s secure, hardware-based node offers…

Build a mobile hacking rig with a Pixel and Kali NetHunter
12
Jun
2025

Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3…

Cybercriminals are turning stolen data into a thriving black market
12
Jun
2025

Cybercriminals are turning stolen data into a thriving black market

Cybercriminals are stealing data and running full-scale businesses around it. Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) report reveals…

Want fewer security fires to fight? Start with threat modeling
12
Jun
2025

Want fewer security fires to fight? Start with threat modeling

CISOs understand that threat modeling helps teams identify risks early and build safer systems. But outside the security org, the…

CISOs call for operational threat intelligence integration
12
Jun
2025

CISOs call for operational threat intelligence integration

98% of CISOs face challenges when using threat intelligence, according to Trellix. The biggest problems are keeping up with changing…

Email security risks healthcare IT can’t afford to ignore
12
Jun
2025

Email security risks healthcare IT can’t afford to ignore

92% of healthcare IT leaders say they’re confident in their ability to prevent email-based data breaches, but according to Paubox,…

44% of mobile users encounter scams every day
12
Jun
2025

44% of mobile users encounter scams every day

Nearly half of of mobile users encounter mobile scams daily, with people in the US and UK more likely to…

Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
11
Jun
2025

Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains

More than 20,000 malicious IP addresses and domains used by information-stealing malware were taken down during an international cybercrime crackdown…

ConnectWise is rotating code signing certificates. What happened?
11
Jun
2025

ConnectWise is rotating code signing certificates. What happened?

Connectwise customers who use the company’s ScreenConnect, Automate, and ConnectWise RMM solutions are urged to update all agents and/or validate…

SpecterOps Privilege Zones enables security teams to define logical access boundaries
11
Jun
2025

SpecterOps Privilege Zones enables security teams to define logical access boundaries

SpecterOps introduced Privilege Zones, a new addition to its flagship BloodHound Enterprise platform. Privilege Zones enable teams to define custom…

Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)
11
Jun
2025

Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)

For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Also,…

86% of all LLM usage is driven by ChatGPT
11
Jun
2025

86% of all LLM usage is driven by ChatGPT

ChatGPT remains the most widely used LLM among New Relic customers, making up over 86% of all tokens processed. Developers…