Category: HelpnetSecurity

From theory to training: Lessons in making NICE usable
10
Oct
2025

From theory to training: Lessons in making NICE usable

SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from…

Nagios: Open-source monitoring solution - Help Net Security
10
Oct
2025

Nagios: Open-source monitoring solution – Help Net Security

Nagios is an open-source monitoring solution, now included as part of the robust Nagios Core Services Platform (CSP). It delivers…

New infosec products of the week: October 10, 2025
10
Oct
2025

New infosec products of the week: October 10, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Object First, OPSWAT, Radiflow, and…

Legit tools, illicit uses: Velociraptor, Nezha turned against victims
09
Oct
2025

Legit tools, illicit uses: Velociraptor, Nezha turned against victims

Threat actors are using an increasing variety of commercial and open-source products to carry out their attacks: according to researchers,…

Attackers compromised ALL SonicWall firewall configuration backup files
09
Oct
2025

Attackers compromised ALL SonicWall firewall configuration backup files

The attackers who brute-forced their way into SonicWall’s firewall cloud backup service accessed configuration backup files of all customers who…

Ready1 for Identity Crisis Management restores operations after identity breaches
09
Oct
2025

Ready1 for Identity Crisis Management restores operations after identity breaches

Semperis released Ready1 for Identity Crisis Management, which combines its Active Directory Forest Recovery (ADFR), Disaster Recovery for Entra Tenant…

Ootbi Mini delivers zero trust, immutable data protection
09
Oct
2025

Ootbi Mini delivers zero trust, immutable data protection

Object First unveiled Ootbi Mini, a new compact immutable storage appliance designed for remote and branch offices, edge environments, and…

Outdated encryption leaves crypto wide open
09
Oct
2025

Outdated encryption leaves crypto wide open

The cryptocurrency sector faces an existential threat on two fronts: none of the 2,138 web applications and 146 mobile apps…

Researchers develop AI system to detect scam websites in search results
09
Oct
2025

Researchers develop AI system to detect scam websites in search results

Scam websites tied to online shopping, pet sales, and other e-commerce schemes continue to cause millions in losses each year….

Behind the screens: Building security customers appreciate
09
Oct
2025

Behind the screens: Building security customers appreciate

In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and…

Six metrics policymakers need to track cyber resilience
09
Oct
2025

Six metrics policymakers need to track cyber resilience

Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage…

Varonis Interceptor stops AI-evasive email attacks
08
Oct
2025

Varonis Interceptor stops AI-evasive email attacks

Varonis Systems announced the availability of Varonis Interceptor, a new approach to email security that uses multi-layered AI to detect…