Category: HelpnetSecurity

Only 3% of organizations have a dedicated budget for SaaS security
03
Feb
2025

Only 3% of organizations have a dedicated budget for SaaS security

Mid-market organizations are grappling with managing the large volume of SaaS applications, both sanctioned and unsanctioned, with actual numbers often…

How to use iCloud Private Relay for enhanced privacy
03
Feb
2025

How to use iCloud Private Relay for enhanced privacy

iCloud Private Relay, included with an iCloud+ subscription, enhances your privacy while browsing the web in Safari. When this feature…

Week in review: Apple 0-day used to target iPhones, DeepSeek’s popularity exploited by scammers
02
Feb
2025

Week in review: Apple 0-day used to target iPhones, DeepSeek’s popularity exploited by scammers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple zero-day vulnerability exploited to…

Patient monitors with backdoor are sending info to China, CISA warns
31
Jan
2025

Patient monitors with backdoor are sending info to China, CISA warns

Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled,…

Infosec products of the month: January 2025
31
Jan
2025

Infosec products of the month: January 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Atsign, authID, BackBox,…

Nine out of ten emails are spam
31
Jan
2025

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like…

Platformization is key to reduce cybersecurity complexity
31
Jan
2025

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according…

Deploying AI at the edge: The security trade-offs and how to manage them
31
Jan
2025

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new…

Cybercrime forums Cracked and Nulled seized, operators arrested
30
Jan
2025

Cybercrime forums Cracked and Nulled seized, operators arrested

Law enforcement from Germany, Australia, Spain, Greece, Romania, Italy, France and the USA have seized and shut down Cracked and…

ExtensionHound: Open-source tool for Chrome extension DNS forensics
30
Jan
2025

ExtensionHound: Open-source tool for Chrome extension DNS forensics

Traditional monitoring tools reveal only traffic from the Chrome process, leaving security teams uncertain about which extension is responsible for…

Zscaler CISO on balancing security and user convenience in hybrid work environments
30
Jan
2025

Zscaler CISO on balancing security and user convenience in hybrid work environments

In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges…

89% of AI-powered APIs rely on insecure authentication mechanisms
30
Jan
2025

89% of AI-powered APIs rely on insecure authentication mechanisms

APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API…