Category: HelpnetSecurity

Package hallucination: LLMs may deliver malicious code to careless devs
14
Apr
2025

Package hallucination: LLMs may deliver malicious code to careless devs

LLMs’ tendency to “hallucinate” code packages that don’t exist could become the basis for a new type of supply chain…

Tirreno: Open-source fraud prevention platform
14
Apr
2025

Tirreno: Open-source fraud prevention platform

Tirreno is an open-source fraud prevention platform designed as a universal analytics tool to monitor online platforms, web applications, SaaS…

The quiet data breach hiding in AI workflows
14
Apr
2025

The quiet data breach hiding in AI workflows

As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions….

Sector by sector: How data breaches are wrecking bottom lines
14
Apr
2025

Sector by sector: How data breaches are wrecking bottom lines

Data breaches are rising across industries, hitting healthcare, finance, and retail especially hard. The damage goes beyond lost data, as…

Organizations can't afford to be non-compliant
14
Apr
2025

Organizations can’t afford to be non-compliant

Non-compliance can cost organizations 2.71 times more than maintaining compliance programs, according to Secureframe. That’s because non-compliance can result in…

Week in review: Microsoft patches exploited Windows CLFS 0-day, WinRAR MotW bypass flaw fixed
13
Apr
2025

Week in review: Microsoft patches exploited Windows CLFS 0-day, WinRAR MotW bypass flaw fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes actively exploited Windows…

Hackers exploit old FortiGate vulnerabilities, use symlink trick to retain limited access to patched devices
11
Apr
2025

Hackers exploit old FortiGate vulnerabilities, use symlink trick to retain limited access to patched devices

A threat actor that has been using known old FortiOS vulnerabilities to breach FortiGate devices for years has also been…

Span Cyber Security Arena 2025: Infosec leaders to discuss the future of digital defense
11
Apr
2025

Span Cyber Security Arena 2025: Infosec leaders to discuss the future of digital defense

Today, in the age of quantum threats, AI and sophisticated digital manipulations, the question is: where does the human factor…

Why remote work is a security minefield (and what you can do about it)
11
Apr
2025

Why remote work is a security minefield (and what you can do about it)

Remote work is seen as more than a temporary solution, it’s a long-term strategy for many organizations. Remote work cybersecurity…

Why security culture is crypto's strongest asset
11
Apr
2025

Why security culture is crypto’s strongest asset

In this Help Net Security interview, Norah Beers, CISO at Grayscale, discusses key security challenges in managing crypto assets, adversary…

Ransomware groups push negotiations to new levels of uncertainty
11
Apr
2025

Ransomware groups push negotiations to new levels of uncertainty

Ransomware attacks increased by nearly 20% in 2024, and the severity rose by 13%, according to At-Bay. The blast radius…

iOS devices face twice the phishing attacks of Android
11
Apr
2025

iOS devices face twice the phishing attacks of Android

2024 brought about countless new cybersecurity challenges including significant growth of the mobile threat landscape, according to Lookout. Threat actors,…