Category: HelpnetSecurity

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale
01
Oct
2025

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale

TELUS Digital has released its continuous automated red-teaming application, Fuel iX Fortify. The solution helps enterprises test GenAI systems at…

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts
01
Oct
2025

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts

Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco Adaptive Security…

Siemens simplifies OT security with virtualized, encrypted connectivity
01
Oct
2025

Siemens simplifies OT security with virtualized, encrypted connectivity

Siemens launched SINEC Secure Connect, the zero trust security platform designed for operational technology (OT) networks. The software solution virtualizes…

Biometric spoofing isn’t as complex as it sounds
01
Oct
2025

Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t…

Hackers love LOTL, this approach shuts them down
01
Oct
2025

Hackers love LOTL, this approach shuts them down

Every time cyber defenders and companies discover new ways to block intrusions, attackers change their tactics and find a way…

A2AS framework targets prompt injection and agentic AI security risks
01
Oct
2025

A2AS framework targets prompt injection and agentic AI security risks

AI systems are now deeply embedded in business operations, and this introduces new security risks that traditional controls are not…

Ransomware remains the leading cause of costly cyber claims
01
Oct
2025

Ransomware remains the leading cause of costly cyber claims

Cyber threats are shifting in 2025, and while large companies are still targets, attackers are turning their attention to smaller…

CISA says it will fill the gap as some federal funding for MS-ISAC dries up
30
Sep
2025

CISA says it will fill the gap as some federal funding for MS-ISAC dries up

The cooperative agreement between the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the not-for-profit Center for Internet Security is…

Acronis brings patch management to consumer backup software
30
Sep
2025

Acronis brings patch management to consumer backup software

Acronis announced the general availability of Acronis True Image 2026, the new release of its natively integrated backup and security…

Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI
30
Sep
2025

Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI

Join Picus Security, SANS, Hacker Valley, and leading CISOs at The BAS Summit 2025 to learn how AI is redefining…

Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247)
30
Sep
2025

Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247)

Western Digital has fixed a critical remote code execution vulnerability (CVE-2025-30247) in the firmware powering its My Cloud network-attached storage…

Legit’s Command Center tracks AI code, models, and MCP server usage across the SDLC
30
Sep
2025

Legit’s Command Center tracks AI code, models, and MCP server usage across the SDLC

Legit Security has updated its AI Security Command Center. As vibe coding and AI-first development reshape how software is built,…