Category: HelpnetSecurity

10 data security companies to watch in 2026
21
Oct
2025

10 data security companies to watch in 2026

At Help Net Security, we’ve been tracking the cybersecurity world for nearly three decades. Through our Industry News section, we’ve…

Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
20
Oct
2025

Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)

Moxa has fixed 5 vulnerabilities in its industrial network security appliances and routers, including a remotely exploitable flaw (CVE-2025-6950) that…

China-linked Salt Typhoon hackers attempt to infiltrate European telco
20
Oct
2025

China-linked Salt Typhoon hackers attempt to infiltrate European telco

Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak…

Inside the messy reality of Microsoft 365 management
20
Oct
2025

Inside the messy reality of Microsoft 365 management

Most MSPs agree that Microsoft 365 is now the backbone of business operations, but a Syncro survey shows that complexity,…

Most AI privacy research looks the wrong way
20
Oct
2025

Most AI privacy research looks the wrong way

Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie…

Why ex-military professionals are a good fit for cybersecurity
20
Oct
2025

Why ex-military professionals are a good fit for cybersecurity

After years of working as part of a team, many military veterans look for work that still carries meaning, challenge,…

Nodepass: Open-source TCP/UDP tunneling solution
20
Oct
2025

Nodepass: Open-source TCP/UDP tunneling solution

When you think of network tunneling, “lightweight” and “enterprise-grade” rarely appear in the same sentence. NodePass, an open-source project, wants…

Why cybersecurity hiring feels so hard right now
20
Oct
2025

Why cybersecurity hiring feels so hard right now

In this Help Net Security video, Carol Lee Hobson, CISO at PayNearMe, explores the realities behind the so-called cybersecurity “talent…

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days
19
Oct
2025

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building a healthcare cybersecurity strategy…

Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
17
Oct
2025

Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)

Threat actors have leveraged a recently patched IOS/IOS XE vulnerability (CVE-2025-20352) to deploy Linux rootkits on vulnerable Cisco network devices….

Microsoft revokes 200 certs used to sign malicious Teams installers
17
Oct
2025

Microsoft revokes 200 certs used to sign malicious Teams installers

By revoking 200 software-signing certificates, Microsoft has hampered the activities of Vanilla Tempest, a ransomware-wielding threat actor that has been…

Levo.ai platform unifies AI security and compliance from development to runtime
17
Oct
2025

Levo.ai platform unifies AI security and compliance from development to runtime

Levo.ai has released its Unified AI Security Platform, designed to secure AI applications from development to runtime. The platform unifies…