Category: HelpnetSecurity

Apiiro unveils AI SAST built on deep code analysis to eliminate false positives
18
Dec
2025

Apiiro unveils AI SAST built on deep code analysis to eliminate false positives

Apiiro introduced Apiiro AI SAST, a new approach to static application security testing (SAST) that automates code risk detection, validation…

Microsoft 365 users targeted in device code phishing attacks
18
Dec
2025

Microsoft 365 users targeted in device code phishing attacks

Attackers are targeting Microsoft 365 users with device code authorization phishing, a technique that fools users into approving access tokens,…

More than half of public vulnerabilities bypass leading WAFs
18
Dec
2025

More than half of public vulnerabilities bypass leading WAFs

Miggo Security has released a new report that examines how web application firewalls are used across real-world security programs. The…

Group Policy abuse reveals China-aligned espionage group targeting governments
18
Dec
2025

Group Policy abuse reveals China-aligned espionage group targeting governments

ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware…

Push Security detects and blocks malicious copy-and-paste activity
18
Dec
2025

Push Security detects and blocks malicious copy-and-paste activity

Push Security announced the release of a new feature designed to tackle one of the fastest-growing cyber threats: ClickFix-style attacks….

Should AI access be treated as a civil right across generations?
18
Dec
2025

Should AI access be treated as a civil right across generations?

AI use is expanding faster than the infrastructure that supports it, and that gap is starting to matter for security,…

The soft underbelly of space isn't in orbit, it's on the ground
18
Dec
2025

The soft underbelly of space isn’t in orbit, it’s on the ground

In this Help Net Security interview, Øystein Thorvaldsen, CISO at KSAT, discusses how adversaries view the ground segment as the…

Privacy risks sit inside the ads that fill your social media feed
18
Dec
2025

Privacy risks sit inside the ads that fill your social media feed

Regulatory limits on explicit targeting have not stopped algorithmic profiling on the web. Ad optimization systems still adapt which ads…

What cybersecurity leaders are reading to stay ahead
18
Dec
2025

What cybersecurity leaders are reading to stay ahead

If you’re looking for holiday gift ideas, books remain one of the simplest ways to spark curiosity and support someone’s…

Cisco email security appliances rooted and backdoored via still unpatched zero-day
17
Dec
2025

Cisco email security appliances rooted and backdoored via still unpatched zero-day

A suspected Chinese-nexus threat group has been compromising Cisco email security devices and planting backdoors and log-purging tools on them…

Actively exploited SonicWall zero-day patched (CVE-2025-40602)
17
Dec
2025

Actively exploited SonicWall zero-day patched (CVE-2025-40602)

SonicWall has patched a local privilege escalation vulnerability (CVE-2025-40602) affecting its Secure Mobile Access (SMA) 1000 appliances and is urging…

Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)
17
Dec
2025

Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)

Attackers are exploiting a recently revealed vulnerability (CVE-2025-59718) to bypass authentication on Fortinet’s FortiGate firewalls, and are leveraging the achieved…