Category: HelpnetSecurity

Week in review: Fake “Windows Update” fuels malware, Salesforce details Gainsight breach
30
Nov
2025

Week in review: Fake “Windows Update” fuels malware, Salesforce details Gainsight breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Quantum encryption is pushing satellite…

New observational auditing framework takes aim at machine learning privacy leaks
28
Nov
2025

New observational auditing framework takes aim at machine learning privacy leaks

Machine learning (ML) privacy concerns continue to surface, as audits show that models can reveal parts of the labels (the…

Social data puts user passwords at risk in unexpected ways
28
Nov
2025

Social data puts user passwords at risk in unexpected ways

Many CISOs already assume that social media creates new openings for password guessing, but new research helps show what that…

Why password management defines PCI DSS success
28
Nov
2025

Why password management defines PCI DSS success

Most CISOs spend their days dealing with noisy dashboards and vendor pitches that all promise a shortcut to compliance. It can…

Fragmented tooling slows vulnerability management
28
Nov
2025

Fragmented tooling slows vulnerability management

Security leaders know vulnerability backlogs are rising, but new data shows how quickly the gap between exposures and available resources…

Infosec products of the month: November 2025
28
Nov
2025

Infosec products of the month: November 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Action1, Barracuda Networks, Bedrock…

Clover raises $36 million to scale product security through AI-native design
27
Nov
2025

Clover raises $36 million to scale product security through AI-native design

Clover announced $36 million in funding to secure the AI-native product wave. The company’s funding round was led by Notable…

Your critical infrastructure is running out of time
27
Nov
2025

Your critical infrastructure is running out of time

Cyber attackers often succeed not because they are inventive, but because the systems they target are old. A new report…

Hottest cybersecurity open-source tools of the month: November 2025
27
Nov
2025

Hottest cybersecurity open-source tools of the month: November 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Heisenberg: Open-source…

The identity mess your customers feel before you do
27
Nov
2025

The identity mess your customers feel before you do

Customer identity has become one of the most brittle parts of the enterprise security stack. Teams know authentication matters, but…

Criminal networks industrialize payment fraud operations
27
Nov
2025

Criminal networks industrialize payment fraud operations

Fraud operations are expanding faster than payment defenses can adjust. Criminal groups function like coordinated businesses that develop tools, automate…

Gainsight breach: Salesforce details attack window, issues investigation guidance
26
Nov
2025

Gainsight breach: Salesforce details attack window, issues investigation guidance

The number of Salesforce customers affected by the recent compromise of Gainsight-published applications is yet to be publicly confirmed, but…