Category: HelpnetSecurity

How to customize Safari for private browsing on iOS
06
Feb
2025

How to customize Safari for private browsing on iOS

Apple’s Safari browser includes several features aimed at enhancing privacy while browsing the web. Two of the most notable privacy…

The overlooked risks of poor data hygiene in AI-driven organizations
06
Feb
2025

The overlooked risks of poor data hygiene in AI-driven organizations

In this Help Net Security interview, Oliver Friedrichs, CEO at Pangea, discusses why strong data hygiene is more important than…

Enterprises invest heavily in AI-powered solutions
06
Feb
2025

Enterprises invest heavily in AI-powered solutions

AI is driving significant changes in attack sources, with 88% of enterprises observing an increase in AI-powered bot attacks in…

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
05
Feb
2025

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)

XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181,…

SafeBreach exposure validation platform identifies security gaps
05
Feb
2025

SafeBreach exposure validation platform identifies security gaps

SafeBreach launched SafeBreach exposure validation platform, which combines the power of its time-tested breach and attack simulation (BAS) product—now called…

Swap EOL Zyxel routers, upgrade Netgear ones!
05
Feb
2025

Swap EOL Zyxel routers, upgrade Netgear ones!

There will be no patches for EOL Zyxel routers under attack via CVE-2024-40891, the company has confirmed. Meanwhile, Netgear has…

Satori provides visibility into data store risk levels
05
Feb
2025

Satori provides visibility into data store risk levels

Satori announced its new capabilities, enabling security teams to be in control of all customer data across the development lifecycle…

Veriti Cloud automates remediation across both on-premises and cloud environments
05
Feb
2025

Veriti Cloud automates remediation across both on-premises and cloud environments

Veriti launched Veriti Cloud, an expansion of its Exposure Assessment and Remediation platform that brings proactive cloud native remediation to…

Crypto-stealing iOS, Android malware found on App Store, Google Play
05
Feb
2025

Crypto-stealing iOS, Android malware found on App Store, Google Play

A number of iOS and Android apps on Apple’s and Google’s official app stores contain a software development kit (SDK)…

Dynatrace strengthens cloud security posture management
05
Feb
2025

Dynatrace strengthens cloud security posture management

Dynatrace announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises managing…

OpenNHP: Cryptography-driven zero trust protocol
05
Feb
2025

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data….

More destructive cyberattacks target financial institutions
05
Feb
2025

More destructive cyberattacks target financial institutions

Financial institutions will continue to be the ultimate targets for criminals and threat actors, as a successful attack offers a…