Category: HelpnetSecurity

Attackers exploited another Gladinet Triofox zero-day (CVE-2025-12480)
11
Nov
2025

Attackers exploited another Gladinet Triofox zero-day (CVE-2025-12480)

Attackers have exploited a now-fixed vulnerability (CVE-2025-12480) in the Gladinet Triofox secure file sharing and remote access platform while it…

GNU Coreutils 9.9 brings fixes and updates across essential tools
11
Nov
2025

GNU Coreutils 9.9 brings fixes and updates across essential tools

GNU Coreutils is the backbone of many enterprise Linux environments. It provides the basic file, shell, and text utilities that…

Firewalla unveils MSP 2.9 to simplify multi-device network management
11
Nov
2025

Firewalla unveils MSP 2.9 to simplify multi-device network management

Firewalla has announced the release of MSP 2.9, the latest update to its Managed Security Portal (MSP). The update is…

How far can police push privacy before it breaks
11
Nov
2025

How far can police push privacy before it breaks

Police use drones, body cameras, and license plate readers as part of their daily work. Supporters say these tools make…

To get funding, CISOs are mastering the language of money
11
Nov
2025

To get funding, CISOs are mastering the language of money

In this Help Net Security interview, Chris Wheeler, CISO at Resilience, talks about how CISOs are managing changing cybersecurity budgets….

CISOs are cracking under pressure
11
Nov
2025

CISOs are cracking under pressure

Cybersecurity leaders are hitting their limit. A new report from Nagomi Security shows that most CISOs are stretched thin, dealing…

Hidden risks in the financial sector's supply chain
11
Nov
2025

Hidden risks in the financial sector’s supply chain

When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research…

Cybersecurity jobs available right now: November 11, 2025
11
Nov
2025

Cybersecurity jobs available right now: November 11, 2025

Academy Cyber Threat Intelligence Analyst Bridewell | United Kingdom | Hybrid – View job details As an Academy Cyber Threat…

Download: Strengthening Identity Security whitepaper
10
Nov
2025

Download: Strengthening Identity Security whitepaper

Identity threats are escalating. Attackers increasingly exploit compromised credentials, often undetected by organizations, and use social engineering to gain access….

Adopting a counterintelligence mindset in luxury logistics
10
Nov
2025

Adopting a counterintelligence mindset in luxury logistics

In this Help Net Security interview, Andrea Succi, Group CISO at Ferrari Group, discusses how cybersecurity is integrated into every…

Wi-Fi signals may hold the key to touchless access control
10
Nov
2025

Wi-Fi signals may hold the key to touchless access control

Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no…

sqlmap: Open-source SQL injection and database takeover tool
10
Nov
2025

sqlmap: Open-source SQL injection and database takeover tool

Finding and exploiting SQL injection vulnerabilities is one of the oldest and most common steps in web application testing. sqlmap…