Category: HelpnetSecurity

21
Apr
2025

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line…

21
Apr
2025

Cybercriminals blend AI and social engineering to bypass detection

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also…

21
Apr
2025

Cyber threats now a daily reality for one in three businesses

Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory…

20
Apr
2025

Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple plugs zero-day holes used…

18
Apr
2025

The Zoom attack you didn’t see coming

Did you know that when participating in a Zoom call, you can grant permission to other participants to control your…

18
Apr
2025

Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)

CVE-2021-20035, an old vulnerability affecting Sonicwall Secure Mobile Access (SMA) 100 series appliances, is being exploited by attackers. Sonicwall confirmed…

18
Apr
2025

New infosec products of the week: April 18, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Cyware, Entrust, PlexTrac,…

18
Apr
2025

Securing digital products under the Cyber Resilience Act

In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means…

18
Apr
2025

When ransomware strikes, what’s your move?

Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the…

18
Apr
2025

Widely available AI tools signal new era of malicious bot activity

Rise in accessible AI tools significantly lowered the barrier to entry for cyber attackers, enabling them to create and deploy…

17
Apr
2025

SafeLine Bot Management: Self-hosted alternative to Cloudflare

Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While…

17
Apr
2025

Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)

CVE-2025-24054, a Windows NTLM hash disclosure vulnerability that Microsoft has issued patches for last month, has been leveraged by threat…