Category: HelpnetSecurity

OpenVPN redefines secure connectivity with Access Server 3.0
10
Oct
2025

OpenVPN redefines secure connectivity with Access Server 3.0

OpenVPN released Access Server 3.0, a major update to its self-hosted business VPN solution that delivers foundational improvements to performance,…

Apple offers $2 million for zero-click exploit chains
10
Oct
2025

Apple offers $2 million for zero-click exploit chains

Apple bug bounty program’s categories are expanding and rewards are rising, and zero-click exploit chains may now earn researchers up…

Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
10
Oct
2025

Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)

CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited…

October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
10
Oct
2025

October 2025 Patch Tuesday forecast: The end of a decade with Microsoft

A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have…

From theory to training: Lessons in making NICE usable
10
Oct
2025

From theory to training: Lessons in making NICE usable

SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from…

Nagios: Open-source monitoring solution - Help Net Security
10
Oct
2025

Nagios: Open-source monitoring solution – Help Net Security

Nagios is an open-source monitoring solution, now included as part of the robust Nagios Core Services Platform (CSP). It delivers…

New infosec products of the week: October 10, 2025
10
Oct
2025

New infosec products of the week: October 10, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Object First, OPSWAT, Radiflow, and…

Legit tools, illicit uses: Velociraptor, Nezha turned against victims
09
Oct
2025

Legit tools, illicit uses: Velociraptor, Nezha turned against victims

Threat actors are using an increasing variety of commercial and open-source products to carry out their attacks: according to researchers,…

Attackers compromised ALL SonicWall firewall configuration backup files
09
Oct
2025

Attackers compromised ALL SonicWall firewall configuration backup files

The attackers who brute-forced their way into SonicWall’s firewall cloud backup service accessed configuration backup files of all customers who…

Ready1 for Identity Crisis Management restores operations after identity breaches
09
Oct
2025

Ready1 for Identity Crisis Management restores operations after identity breaches

Semperis released Ready1 for Identity Crisis Management, which combines its Active Directory Forest Recovery (ADFR), Disaster Recovery for Entra Tenant…

Ootbi Mini delivers zero trust, immutable data protection
09
Oct
2025

Ootbi Mini delivers zero trust, immutable data protection

Object First unveiled Ootbi Mini, a new compact immutable storage appliance designed for remote and branch offices, edge environments, and…

Outdated encryption leaves crypto wide open
09
Oct
2025

Outdated encryption leaves crypto wide open

The cryptocurrency sector faces an existential threat on two fronts: none of the 2,138 web applications and 146 mobile apps…