Category: HelpnetSecurity

SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
23
Jan
2025

SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)

A critical zero-day vulnerability (CVE-2025-23006) affecting SonicWall Secure Mobile Access (SMA) 1000 Series appliances is being exploited by attackers. “We…

Bitsight Instant Insights accelerates vendor risk assessments
23
Jan
2025

Bitsight Instant Insights accelerates vendor risk assessments

Bitsight unveiled Instant Insights, a new offering from the Bitsight IQ suite of AI-based capabilities. The new feature leverages generative…

Defense strategies to counter escalating hybrid attacks
23
Jan
2025

Defense strategies to counter escalating hybrid attacks

In this Help Net Security interview, Tomer Shloman, Sr. Security Researcher at Trellix, talks about attack attribution, outlines solutions for…

Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
23
Jan
2025

Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning

The Web Cache Vulnerability Scanner (WCVS) is an open-source command-line tool for detecting web cache poisoning and deception. The scanner,…

CISOs are juggling security, responsibility, and burnout
23
Jan
2025

CISOs are juggling security, responsibility, and burnout

This article gathers excerpts from multiple reports, presenting statistics and insights that may be valuable for CISOs, helping them with…

Stratoshark: Wireshark for the cloud - now available!
22
Jan
2025

Stratoshark: Wireshark for the cloud – now available!

Stratoshark is an innovative open-source tool that brings Wireshark’s detailed network visibility to the cloud, providing users with a standardized…

Mirai botnet behind the largest DDoS attack to date
22
Jan
2025

Mirai botnet behind the largest DDoS attack to date

Researchers have uncovered two Mirai-based botnets harnessing Internet of Things (IoT) devices to DDoS target organizations around the world. The…

DataDome DDoS Protect detects application layer-based threats
22
Jan
2025

DataDome DDoS Protect detects application layer-based threats

DataDome unveiled DDoS Protect, a cloud-based service designed to block distributed denial-of-service (DDoS) attack traffic at the edge before it…

Lookout Mobile Intelligence APIs identifies cross-platform attacks
22
Jan
2025

Lookout Mobile Intelligence APIs identifies cross-platform attacks

Lookout announced their new Lookout Mobile Intelligence Application Programming Interfaces (APIs), exponentially expanding the scope of visibility into enterprise mobile…

48,000+ internet-facing Fortinet firewalls still open to attack
22
Jan
2025

48,000+ internet-facing Fortinet firewalls still open to attack

Despite last week’s confirmation of and warnings about long-standing exploitation of CVE-2024-55591, a critical vulnerability affecting Fortinet Fortigate firewalls, too…

China-aligned PlushDaemon APT compromises supply chain of Korean VPN
22
Jan
2025

China-aligned PlushDaemon APT compromises supply chain of Korean VPN

ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly…

Acronis CISO on why backup strategies fail and how to make them resilient
22
Jan
2025

Acronis CISO on why backup strategies fail and how to make them resilient

In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures,…