Category: HelpnetSecurity

New system aims to keep people connected when networks fail
08
Oct
2025

New system aims to keep people connected when networks fail

When disaster strikes, communication often fails. Cell towers can go offline, internet connections can disappear, and people are left without…

Redis patches critical "RediShell" RCE vulnerability, update ASAP! (CVE-2025-49844)
07
Oct
2025

Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)

Redis, the company behind the widely used in-memory data structure store of the same name, has released patches for a…

OPSWAT’s MetaDefender Drive delivers portable, network-free threat scanning
07
Oct
2025

OPSWAT’s MetaDefender Drive delivers portable, network-free threat scanning

OPSWAT launched MetaDefender Drive with Smart Touch, a portable cybersecurity device designed for malware and compliance scanning of transient cyber…

Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)
07
Oct
2025

Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)

Resecurity and watchTowr researchers have analyzed the leaked scripts used by attackers to exploit CVE-2025-61882 on internet-facing Oracle ESB instances….

Cybersecurity jobs available right now: October 7, 2025
07
Oct
2025

Cybersecurity jobs available right now: October 7, 2025

Application Security / DevSecOps Engineer AvetixCyber | USA | Remote – View job details As an Application Security / DevSecOps…

How to get better results from bug bounty programs without wasting money
07
Oct
2025

How to get better results from bug bounty programs without wasting money

The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that…

The architecture of lies: Bot farms are running the disinformation war
07
Oct
2025

The architecture of lies: Bot farms are running the disinformation war

Bot farms have moved into the center of information warfare, using automated accounts to manipulate public opinion, influence elections, and…

Cybersecurity’s next test: AI, quantum, and geopolitics
07
Oct
2025

Cybersecurity’s next test: AI, quantum, and geopolitics

Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings…

Hackers launch data leak site to extort 39 victims, or Salesforce
06
Oct
2025

Hackers launch data leak site to extort 39 victims, or Salesforce

Scattered Lapsus$ Hunters launched a data leak site over the weekend, aiming to pressure organizations whose Salesforce databases they have…

eBook: Defending Identity Security the Moment It’s Threatened
06
Oct
2025

eBook: Defending Identity Security the Moment It’s Threatened

Credential-based attacks happen in seconds. Learn how to block weak or stolen passwords instantly, safeguard accounts in real time, and…

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
06
Oct
2025

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)

The Cl0p extortion gang exploited multiple Oracle E-Business Suite (EBS) vulnerabilities, including one zero-day flaw (CVE-2025-61882), “to steal large amounts…

Old authentication habits die hard
06
Oct
2025

Old authentication habits die hard

Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and…