Category: HelpnetSecurity

10
Jul
2025

Cynomi’s platform updates enable service providers to prioritize their security efforts

Cynomi has launched new business impact analysis (BIA) and business continuity planning (BCP) features. Designed to help cybersecurity professionals identify…

10
Jul
2025

Lepide Protect detects, prioritizes, and revokes excessive permissions

In a move set to redefine the way organizations manage data access and implement zero trust, Lepide launched Lepide Protect, an…

10
Jul
2025

What EU’s PQC roadmap means on the ground

In this Help Net Security interview, David Warburton, Director at F5 Labs, discusses how the EU’s Post-Quantum Cryptography (PQC) roadmap…

10
Jul
2025

Fake online stores look real, rank high, and trap unsuspecting buyers

Shopping on a fake online store can lead to more than a bad purchase. It could mean losing money, having…

10
Jul
2025

C-suites step up on OT cybersecurity, and it’s paying off

There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or…

10
Jul
2025

Global software supply chain visibility remains critically low

Only 23% of organizations are confident that they have very high visibility of their software supply chain, according to LevelBlue’s…

09
Jul
2025

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)

For July 2025 Patch Tuesday, Microsoft has released patches for 130 vulnerabilities, among them one that’s publicly disclosed (CVE-2025-49719) and…

09
Jul
2025

It’s time to give AI security its own playbook and the people to run it

In this Help Net Security interview, Dr. Nicole Nichols, Distinguished Engineer in Machine Learning Security at Palo Alto Networks, discusses…

09
Jul
2025

Why your security team feels stuck

Cybersecurity friction usually gets framed as a user problem: password policies that frustrate employees, MFA that slows down logins, or…

09
Jul
2025

Kanvas: Open-source incident response case management tool

Kanvas is an open-source incident response case management tool with a simple desktop interface, built in Python. It gives investigators…

09
Jul
2025

6 eye-opening books on AI’s rise, risks, and realities

AI is changing how we detect, prevent, and respond to cyber threats. From traditional networks to emerging spaces, it is…

08
Jul
2025

Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)

With PoC exploits for CVE-2025-5777 (aka CitrixBleed 2) now public and reports of active exploitation of the flaw since mid-June,…