Category: HelpnetSecurity

Cybersecurity jobs available right now: October 28, 2025
28
Oct
2025

Cybersecurity jobs available right now: October 28, 2025

Analyst, Cybersecurity Threat Intelligence Brookfield Renewable | Canada | On-site – View job details As a Cybersecurity Threat Intelligence Analyst,…

eBook: A quarter century of Active Directory
27
Oct
2025

eBook: A quarter century of Active Directory

Active Directory (AD) remains the backbone of enterprise identity and a prime target for attackers. Explore its 25-year history, evolving…

Ransomware, extortion groups adapt as payment rates reach historic lows
27
Oct
2025

Ransomware, extortion groups adapt as payment rates reach historic lows

Ransomware groups are facing an economic downturn of their own: In Q3 2025, only 23 percent of victims paid a…

DDoS, data theft, and malware are storming the gaming industry
27
Oct
2025

DDoS, data theft, and malware are storming the gaming industry

When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every…

Can your earbuds recognize you? Researchers are working on it
27
Oct
2025

Can your earbuds recognize you? Researchers are working on it

Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step…

Dependency-Track: Open-source component analysis platform
27
Oct
2025

Dependency-Track: Open-source component analysis platform

Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge….

AI writes code like a junior dev, and security is feeling it
27
Oct
2025

AI writes code like a junior dev, and security is feeling it

The industry is entering a phase where code is being deployed faster than it can be secured, according to OX…

Product showcase: Neo Network Utility makes network checks simple
27
Oct
2025

Product showcase: Neo Network Utility makes network checks simple

Want to see if a remote server is still alive, or trace the path your data takes across the internet?…

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors
26
Oct
2025

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks…

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
24
Oct
2025

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)

Microsoft has released an out-of-band security update that “comprehensively address” CVE-2025-59287, a remote code execution vulnerability in the Windows Server…

Microsoft blocks risky file previews in Windows File Explorer
24
Oct
2025

Microsoft blocks risky file previews in Windows File Explorer

Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from…

Building trust in AI: How to keep humans in control of cybersecurity
24
Oct
2025

Building trust in AI: How to keep humans in control of cybersecurity

In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype…