Category: HelpnetSecurity

Microsoft blocks risky file previews in Windows File Explorer
24
Oct
2025

Microsoft blocks risky file previews in Windows File Explorer

Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from…

Building trust in AI: How to keep humans in control of cybersecurity
24
Oct
2025

Building trust in AI: How to keep humans in control of cybersecurity

In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype…

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense
24
Oct
2025

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers…

Smart helmet tech points to the future of fighting audio deepfakes
24
Oct
2025

Smart helmet tech points to the future of fighting audio deepfakes

Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate…

When AI writes code, humans clean up the mess
24
Oct
2025

When AI writes code, humans clean up the mess

AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with…

New infosec products of the week: October 24, 2025
24
Oct
2025

New infosec products of the week: October 24, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout…

Researchers expose large-scale YouTube malware distribution network
23
Oct
2025

Researchers expose large-scale YouTube malware distribution network

Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed…

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)
23
Oct
2025

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)

CVE-2025-61932, an “improper verification of source of a communication channel” vulnerability affecting Lanscope Endpoint Manager, has been exploited as a…

Wireshark 4.6.0 brings major updates for packet analysis and decryption
23
Oct
2025

Wireshark 4.6.0 brings major updates for packet analysis and decryption

If you’ve ever used Wireshark to dig into network traffic you know how vital even small upgrades can be. With…

NETSCOUT’s KlearSight Sensor delivers visibility into encrypted Kubernetes environments
23
Oct
2025

NETSCOUT’s KlearSight Sensor delivers visibility into encrypted Kubernetes environments

NETSCOUT announced an innovation designed to meet organizations’ needs for observability within complex cloud environments. With the demands of large,…

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)
23
Oct
2025

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

Attackers are trying to exploit CVE-2025-54236, a critical vulnerability affecting Adobe Commerce and Magento Open Source, Sansec researchers have warned….

How Lazarus Group used fake job ads to spy on Europe's drone and defense sector
23
Oct
2025

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This…