Category: HelpnetSecurity

AISLE launches from stealth with AI-native cyber reasoning system to tackle zero-day vulnerabilities
17
Oct
2025

AISLE launches from stealth with AI-native cyber reasoning system to tackle zero-day vulnerabilities

AISLE emerged from stealth, delivering the AI-native cyber reasoning system (CRS) that autonomously identifies, triages and remediates with verification both…

A new approach to blockchain spam: Local reputation over global rules
17
Oct
2025

A new approach to blockchain spam: Local reputation over global rules

Spam has long been a nuisance in blockchain networks, clogging transaction queues and driving up fees. A new research paper…

Inside healthcare's quiet cybersecurity breakdown
17
Oct
2025

Inside healthcare’s quiet cybersecurity breakdown

Hospitals, clinics, and care networks continue to treat cybersecurity as a back-office issue, according to the 2025 Healthcare IT Landscape…

Everyone’s adopting AI, few are managing the risk
17
Oct
2025

Everyone’s adopting AI, few are managing the risk

AI is spreading across enterprise risk functions, but confidence in those systems remains uneven, according to AuditBoard. More than half…

New infosec products of the week: October 17, 2025
17
Oct
2025

New infosec products of the week: October 17, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Aura, Bitsight, Blumira, Cayosoft, Corelight,…

"Perfect" Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
16
Oct
2025

“Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)

CISA has added CVE-2025-54253, a misconfiguration vulnerability in Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), to its…

Cayosoft Guardian Protector safeguards Microsoft 365 and hybrid identity systems
16
Oct
2025

Cayosoft Guardian Protector safeguards Microsoft 365 and hybrid identity systems

Cayosoft introduced Cayosoft Guardian Protector, a free, always-on solution that delivers real-time threat detection, proactive alerts, resolution guidance, and change…

Everyone wants AI, but few are ready to defend it
16
Oct
2025

Everyone wants AI, but few are ready to defend it

The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that…

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
16
Oct
2025

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as…

The password problem we keep pretending to fix
16
Oct
2025

The password problem we keep pretending to fix

Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access…

ImmuniWeb Expands discovery with ASM and Dark web packages
16
Oct
2025

ImmuniWeb Expands discovery with ASM and Dark web packages

On top of several new free tools launched during the summer, ImmuniWeb released over 500 updates, improvements, new features, and…

F5 data breach: "Nation-state attackers" stole BIG-IP source code, vulnerability info
15
Oct
2025

F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info

US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information…