Category: HelpnetSecurity

How to detect and disable Apple AirTags that might be tracking you
11
Feb
2025

How to detect and disable Apple AirTags that might be tracking you

Apple’s AirTags are a convenient way to track personal items like keys and bags, but they also raise concerns about…

Cybersecurity jobs available right now: February 11, 2025
11
Feb
2025

Cybersecurity jobs available right now: February 11, 2025

Application Offensive Security Consultant Sharp Decisions | USA | On-site – View job details As an Application Offensive Security Consultant,…

Malicious ML models found on Hugging Face Hub
10
Feb
2025

Malicious ML models found on Hugging Face Hub

Researchers have spotted two machine learning (ML) models containing malicious code on Hugging Face Hub, the popular online repository for…

Political campaigns struggle to balance AI personalization and voter privacy
10
Feb
2025

Political campaigns struggle to balance AI personalization and voter privacy

In this Help Net Security interview, Mateusz Łabuz, researcher at the IFSH, discusses the balance between using AI for personalized…

February 2025 Patch Tuesday forecast: New directions for AI development
10
Feb
2025

February 2025 Patch Tuesday forecast: New directions for AI development

The new year has started with a whirlwind of activity, and one of the hottest topics in the news is…

Security validation: The new standard for cyber resilience
10
Feb
2025

Security validation: The new standard for cyber resilience

Security validation has officially turned a corner. Once considered a “nice-to-have” it’s now a top priority for security leaders worldwide….

Beelzebub: Open-source honeypot framework - Help Net Security
10
Feb
2025

Beelzebub: Open-source honeypot framework – Help Net Security

Beelzebub is an open-source honeypot framework engineered to create a secure environment for detecting and analyzing cyber threats. It features…

Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play
09
Feb
2025

Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Russian cybercrooks exploiting 7-Zip zero-day…

Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
07
Feb
2025

Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys

A ViewState code injection attack spotted by Microsoft threat researchers in December 2024 could be easily replicated by other attackers,…

Self-sovereign identity could transform fraud prevention, but…
07
Feb
2025

Self-sovereign identity could transform fraud prevention, but…

The way we manage digital identity is fundamentally broken. The root of the problem lies in traditional, centralized identity models,…

Ghidra 11.3 released: New features, performance improvements, bug fixes
07
Feb
2025

Ghidra 11.3 released: New features, performance improvements, bug fixes

NSA’s Research Directorate released version 11.3 of Ghidra, an open-source software reverse engineering (SRE) framework. It offers advanced analysis tools,…

Infosec pros struggle under growing compliance
07
Feb
2025

Infosec pros struggle under growing compliance

The implementation of new regulatory measures that impact the UK, EU, and beyond are driving organizations to enhance vigilance in…