Category: HelpnetSecurity

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
22
Apr
2025

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)

There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last…

Stellar Cyber boosts security operations with human-augmented Autonomous SOC
22
Apr
2025

Stellar Cyber boosts security operations with human-augmented Autonomous SOC

At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the…

What school IT admins are up against, and how to help them win
22
Apr
2025

What school IT admins are up against, and how to help them win

School IT admins are doing tough, important work under difficult conditions. From keeping Wi-Fi stable during exams to locking down…

The legal blind spot of shadow IT
22
Apr
2025

The legal blind spot of shadow IT

Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance…

Email security, simplified: How PowerDMARC makes DMARC easy
22
Apr
2025

Email security, simplified: How PowerDMARC makes DMARC easy

Email is still the top way attackers get into organizations. Now, big players like Google, Yahoo, and Microsoft are cracking…

The C-suite gap that's putting your company at risk
22
Apr
2025

The C-suite gap that’s putting your company at risk

New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on…

Compliance weighs heavily on security and GRC teams
22
Apr
2025

Compliance weighs heavily on security and GRC teams

Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report…

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)
21
Apr
2025

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)

Oracle has released version 8 of its Unbreakable Enterprise Kernel (UEK), a custom Linux kernel built for Oracle Linux. UEK…

Why CISOs are watching the GenAI supply chain shift closely
21
Apr
2025

Why CISOs are watching the GenAI supply chain shift closely

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders…

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
21
Apr
2025

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line…

Cybercriminals blend AI and social engineering to bypass detection
21
Apr
2025

Cybercriminals blend AI and social engineering to bypass detection

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also…

Cyber threats now a daily reality for one in three businesses
21
Apr
2025

Cyber threats now a daily reality for one in three businesses

Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory…