Category: HelpnetSecurity

Hackers claim to have plundered Red Hat's GitHub repos
02
Oct
2025

Hackers claim to have plundered Red Hat’s GitHub repos

The Crimson Collective, an emerging extortion / hacker group, has made a bombshell claim on their Telegram channel: they have…

OpenSSL 3.6.0: New features, crypto support
02
Oct
2025

OpenSSL 3.6.0: New features, crypto support

The OpenSSL Project has announced the release of OpenSSL 3.6.0, a feature update that brings significant functionality improvements, standards compliance,…

Oracle customers targeted with emails claiming E-Business Suite breach, data theft
02
Oct
2025

Oracle customers targeted with emails claiming E-Business Suite breach, data theft

Unknown attackers claiming affiliation with the Cl0p extortion gang are hitting business and IT executives at various companies with emails…

ProSpy and ToSpy: New spyware families impersonating secure messaging apps
02
Oct
2025

ProSpy and ToSpy: New spyware families impersonating secure messaging apps

ESET researchers have found two Android spyware campaigns aimed at people looking for secure messaging apps such as Signal and…

Underwriting is shifting to AI-driven, real-time decisions by 2030
02
Oct
2025

Underwriting is shifting to AI-driven, real-time decisions by 2030

Underwriting is undergoing a major transformation as financial institutions push for faster decisions, better fraud detection, and greater personalization, according…

Chekov: Open-source static code analysis tool
02
Oct
2025

Chekov: Open-source static code analysis tool

Checkov is an open-source tool designed to help teams secure their cloud infrastructure and code. At its core, it’s a…

Building a mature automotive cybersecurity program beyond checklists
02
Oct
2025

Building a mature automotive cybersecurity program beyond checklists

In this Help Net Security interview, Robert Sullivan, CIO & CISO at Agero, shares his perspective on automotive cybersecurity. He…

GPT needs to be rewired for security
02
Oct
2025

GPT needs to be rewired for security

LLMs and agentic systems already shine at everyday productivity, including transcribing and summarizing meetings, extracting action items, prioritizing critical emails,…

The energy sector is ground zero for global cyber activity
02
Oct
2025

The energy sector is ground zero for global cyber activity

A new study from the Karlsruhe Institute of Technology shows how geopolitical tensions shape cyberattacks on power grids, fuel systems,…

Biotech platforms keep missing the mark on security fundamentals
02
Oct
2025

Biotech platforms keep missing the mark on security fundamentals

A new security posture report on the biotech sector shows how quickly attackers could reach sensitive health data with only…

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S.
01
Oct
2025

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S.

North Korea’s clandestine IT Worker (ITW) program, which is long known for targeting U.S. technology firms and crypto firms, has…

Google Drive for desktop will spot, stop and remedy ransomware damage
01
Oct
2025

Google Drive for desktop will spot, stop and remedy ransomware damage

Google has rolled out AI-powered ransomware detection and file restoration features in Drive for desktop, Google’s official file syncing and…