Category: HelpnetSecurity

Attackers fake IT support calls to steal Salesforce data
04
Jun
2025

Attackers fake IT support calls to steal Salesforce data

Over the past several months, a threat group has been actively breaching organizations’ Salesforce instances and exfiltrating customer and business…

Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
04
Jun
2025

Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)

Google has fixed two Chrome vulnerabilities, including a zero-day flaw (CVE-2025-5419) with an in-the-wild exploit. About CVE-2025-5419 CVE-2025-5419 is a…

Photos: Infosecurity Europe 2025, part 2
04
Jun
2025

Photos: Infosecurity Europe 2025, part 2

Infosecurity Europe 2025 is a cybersecurity event taking place from June 3 to 5 in London. Help Net Security is…

TXOne Networks unveils intelligent vulnerability mitigation capability
04
Jun
2025

TXOne Networks unveils intelligent vulnerability mitigation capability

TXOne Networks announced an expanded new version of its SageOne OT Cybersecurity Governance Platform. Already relied upon by many industrial…

04
Jun
2025

TXOne Networks unveils intelligent vulnerability mitigation capability

TXOne Networks announced an expanded new version of its SageOne OT Cybersecurity Governance Platform. Already relied upon by many industrial…

Varonis Identity Protection unifies identity and data security
04
Jun
2025

Varonis Identity Protection unifies identity and data security

Varonis announced Varonis Identity Protection, the latest enhancement to its Data Security Platform that gives organizations visibility and control of…

How to manage your cyber risk in a modern attack surface
04
Jun
2025

How to manage your cyber risk in a modern attack surface

According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76%…

Rethinking governance in a decentralized identity world
04
Jun
2025

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy,…

Agentic AI and the risks of unpredictable autonomy
04
Jun
2025

Agentic AI and the risks of unpredictable autonomy

In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often…

CISOs need better tools to turn risk into action
04
Jun
2025

CISOs need better tools to turn risk into action

Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to…

AttackIQ Ready3 identifies which vulnerabilities are truly exposed
03
Jun
2025

AttackIQ Ready3 identifies which vulnerabilities are truly exposed

AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery…

Akamai launches DNS Posture Management for real-time monitoring and guided remediation
03
Jun
2025

Akamai launches DNS Posture Management for real-time monitoring and guided remediation

Akamai Technologies has introduced Akamai DNS Posture Management, a solution that offers unified, multicloud visibility over all DNS assets. The…