Category: HelpnetSecurity

23
Apr
2025

The dark side of YouTube: Malicious links, phishing, and deepfakes

With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and…

23
Apr
2025

Phishing emails delivering infostealers surge 84%

Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to…

22
Apr
2025

54% of tech hiring managers expect layoffs in 2025

54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say…

22
Apr
2025

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)

There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last…

22
Apr
2025

Stellar Cyber boosts security operations with human-augmented Autonomous SOC

At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the…

22
Apr
2025

What school IT admins are up against, and how to help them win

School IT admins are doing tough, important work under difficult conditions. From keeping Wi-Fi stable during exams to locking down…

22
Apr
2025

The legal blind spot of shadow IT

Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance…

22
Apr
2025

Email security, simplified: How PowerDMARC makes DMARC easy

Email is still the top way attackers get into organizations. Now, big players like Google, Yahoo, and Microsoft are cracking…

22
Apr
2025

The C-suite gap that’s putting your company at risk

New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on…

22
Apr
2025

Compliance weighs heavily on security and GRC teams

Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report…

21
Apr
2025

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)

Oracle has released version 8 of its Unbreakable Enterprise Kernel (UEK), a custom Linux kernel built for Oracle Linux. UEK…

21
Apr
2025

Why CISOs are watching the GenAI supply chain shift closely

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders…