Category: HelpnetSecurity

03
Dec
2025

CISOs are questioning what a crisis framework should look like

CISOs increasingly assume the next breach is coming. What concerns them most is whether their teams will understand the incident…

02
Dec
2025

Forward Edge-AI delivers quantum-safe data diode and earns communications patent

Forward Edge-AI announced two major milestones in advancing quantum-resistant communications: the United States Patent and Trademark Office (USPTO) has issued…

02
Dec
2025

Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)

Google has shipped patches for 51 Android vulnerabilities, including two high-severity flaws (CVE-2025-48633, CVE-2025-48572) that “may be under limited, targeted…

02
Dec
2025

Span Cyber Security Arena 2026 to offer new perspectives on the development of cybersecurity

Through lectures, deep-dive presentations, best practice examples, and masterclasses, the focus of Span Cyber Security Arena 2026 will be on…

02
Dec
2025

How a noisy ransomware intrusion exposed a long-term espionage foothold

Getting breached by two separate and likely unconnected cyber attack groups is a nightmare scenario for any organization, but can…

02
Dec
2025

MuddyWater cyber campaign adds new backdoors in latest wave of attacks

ESET researchers say an Iran aligned threat group is refining its playbook again, and the latest activity shows how much…

02
Dec
2025

Attackers keep finding new ways to fool AI

AI development keeps accelerating while the safeguards around it move on uneven ground, according to The International AI Safety Report….

02
Dec
2025

Creative cybersecurity strategies for resource-constrained institutions

In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity…

02
Dec
2025

Product showcase: UserLock IAM for Active Directory

UserLock brings modern identity and access management (IAM) to Active Directory, adding granular multi-factor authentication (MFA), contextual access controls, single…

02
Dec
2025

The collapse of trust at the identity layer

Identity verification has become the latest front in the fight against industrialized fraud, according to a new report from Regula….

02
Dec
2025

Cybersecurity jobs available right now: December 2, 2025

Application Security Manager Oddity | Israel | On-site – View job details As an Application Security Manager, you will conduct…

01
Dec
2025

Cryptomixer crypto laundering service taken down by law enforcement

German and Swiss law enforcement agencies have taken down Cryptomixer, an illegal cryptocurrency mixer service, and have confiscated over 25…