Category: HelpnetSecurity

Cybersecurity jobs available right now: February 18, 2025
18
Feb
2025

Cybersecurity jobs available right now: February 18, 2025

Airport Cybersecurity Engineer II Salt Lake City Corporation | USA | On-site – View job details As an Airport Cybersecurity…

Unlocking OSINT: Top books to learn from
17
Feb
2025

Unlocking OSINT: Top books to learn from

Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles…

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
17
Feb
2025

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging…

How CISOs can balance security and business agility in the cloud
17
Feb
2025

How CISOs can balance security and business agility in the cloud

In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between…

Orbit: Open-source Nuclei security scanning and automation platform
17
Feb
2025

Orbit: Open-source Nuclei security scanning and automation platform

Orbit is an open-source platform built to streamline large-scale Nuclei scans, enabling teams to manage, analyze, and collaborate on security…

Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged
16
Feb
2025

Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes two actively exploited…

vCISOs are in high demand
14
Feb
2025

vCISOs are in high demand

Regardless of job title, 92% of executives stated they had some degree of confidence in their organization’s ability to meet…

New GRC and cyber risk strategies emphasize risk adaptability
14
Feb
2025

New GRC and cyber risk strategies emphasize risk adaptability

MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions…

Threat actors are using legitimate Microsoft feature to compromise M365 accounts
14
Feb
2025

Threat actors are using legitimate Microsoft feature to compromise M365 accounts

Suspected Russian threat actors have been taking advantage of Microsoft Device Code Authentication to trick targets into granting them access…

Grip Security unveils SSPM solution to strengthen SaaS security posture
14
Feb
2025

Grip Security unveils SSPM solution to strengthen SaaS security posture

Grip Security has unveiled its SaaS Security Posture Management (SSPM) solution, which proactively identifies misconfigurations, enforces best practices and strengthens…

Pig butchering scams are exploding
14
Feb
2025

Pig butchering scams are exploding

2024 is set to be a record year for scammers who received at least US$9.9 billion in crypto revenues from…

Inconsistent security strategies fuel third-party threats
14
Feb
2025

Inconsistent security strategies fuel third-party threats

47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing…