Category: HelpnetSecurity

20
Jun
2025

CISOs flag gaps in GenAI strategy, skills, and infrastructure

95% of C-suite leaders say that GenAI is driving a new level of innovation in their organizations, according to NTT…

20
Jun
2025

AI Index 2025: What’s changing and why it matters

Stanford recently released its AI Index 2025, and it’s packed with insights on how AI is changing. For CISOs, it’s…

20
Jun
2025

New infosec products of the week: June 20, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Dashlane, Sumsub, and Jumio….

19
Jun
2025

Thieves don’t need your car keys, just a wireless signal

A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote…

19
Jun
2025

Why AI code assistants need a security reality check

In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants…

19
Jun
2025

GPS tracker detection made easy with off-the-shelf hardware

Cyberstalkers are increasingly turning to cheap GPS trackers to secretly monitor people in real time. These devices, which often cost…

19
Jun
2025

91% noise: A look at what’s wrong with traditional SAST tools

Traditional static application security testing (SAST) tools are falling short. That’s the key takeaway from a recent report that tested…

19
Jun
2025

How C-suite roles are shaping the future of tech leadership

As companies accelerate towards technology-driven business models, the tech C-suite is embracing new skills, greater influence, and a unified approach…

18
Jun
2025

AWS launches new cloud security features

Amazon Web Services has announced new and improved security features at its annual AWS re:Inforce cloud security conference. The company…

18
Jun
2025

Jumio Liveness Premium combats deepfakes and injection attacks

Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company’s most advanced biometric liveness detection solution to date. Jumio’s…

18
Jun
2025

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)

Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CVE-2025-6019) that can be exploited in tandem to achieve root…

18
Jun
2025

AI is changing cybersecurity roles, and entry-level jobs are at risk

Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging…