Category: HelpnetSecurity

Attackers are chaining flaws to breach Palo Alto Networks firewalls
19
Feb
2025

Attackers are chaining flaws to breach Palo Alto Networks firewalls

Exploitation attempts targeting CVE-2025-0108, a recently disclosed authentication bypass vulnerability affecting the management web interface of Palo Alto Networks’ firewalls,…

Edge Delta Security Data Pipelines mitigates security threats
19
Feb
2025

Edge Delta Security Data Pipelines mitigates security threats

Edge Delta announced its Security Data Pipelines. This solution empowers security teams to process, analyze, and act on security data…

Pangea introduces AI guardrails to secure AI applications
19
Feb
2025

Pangea introduces AI guardrails to secure AI applications

Pangea announced AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure….

Kunai: Open-source threat hunting tool for Linux
19
Feb
2025

Kunai: Open-source threat hunting tool for Linux

Kunai is an open-source tool that provides deep and precise event monitoring for Linux environments. “What sets Kunai apart is…

Cyber hygiene habits that many still ignore
19
Feb
2025

Cyber hygiene habits that many still ignore

Cybersecurity advice is everywhere. We’re constantly reminded to update our passwords, enable two-factor authentication, and avoid clicking suspicious links. Yet,…

BlackLock ransomware onslaught: What to expect and how to fight it
18
Feb
2025

BlackLock ransomware onslaught: What to expect and how to fight it

BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest. Its success is…

ProcessUnity accelerates third-party assessments - Help Net Security
18
Feb
2025

ProcessUnity accelerates third-party assessments – Help Net Security

ProcessUnity announced the next generation of the Global Risk Exchange. This platform transforms the third-party assessment process, reducing friction for…

The risks of autonomous AI in machine-to-machine interactions
18
Feb
2025

The risks of autonomous AI in machine-to-machine interactions

In this Help Net Security, Oded Hareven, CEO of Akeyless Security, discusses how enterprises should adapt their cybersecurity strategies to…

Cybersecurity jobs available right now: February 18, 2025
18
Feb
2025

Cybersecurity jobs available right now: February 18, 2025

Airport Cybersecurity Engineer II Salt Lake City Corporation | USA | On-site – View job details As an Airport Cybersecurity…

Unlocking OSINT: Top books to learn from
17
Feb
2025

Unlocking OSINT: Top books to learn from

Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles…

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
17
Feb
2025

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging…

How CISOs can balance security and business agility in the cloud
17
Feb
2025

How CISOs can balance security and business agility in the cloud

In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between…