Category: HelpnetSecurity

Dependency-Track: Open-source component analysis platform
27
Oct
2025

Dependency-Track: Open-source component analysis platform

Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge….

AI writes code like a junior dev, and security is feeling it
27
Oct
2025

AI writes code like a junior dev, and security is feeling it

The industry is entering a phase where code is being deployed faster than it can be secured, according to OX…

Product showcase: Neo Network Utility makes network checks simple
27
Oct
2025

Product showcase: Neo Network Utility makes network checks simple

Want to see if a remote server is still alive, or trace the path your data takes across the internet?…

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors
26
Oct
2025

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks…

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
24
Oct
2025

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)

Microsoft has released an out-of-band security update that “comprehensively address” CVE-2025-59287, a remote code execution vulnerability in the Windows Server…

Microsoft blocks risky file previews in Windows File Explorer
24
Oct
2025

Microsoft blocks risky file previews in Windows File Explorer

Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from…

Building trust in AI: How to keep humans in control of cybersecurity
24
Oct
2025

Building trust in AI: How to keep humans in control of cybersecurity

In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype…

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense
24
Oct
2025

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers…

Smart helmet tech points to the future of fighting audio deepfakes
24
Oct
2025

Smart helmet tech points to the future of fighting audio deepfakes

Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate…

When AI writes code, humans clean up the mess
24
Oct
2025

When AI writes code, humans clean up the mess

AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with…

New infosec products of the week: October 24, 2025
24
Oct
2025

New infosec products of the week: October 24, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout…

Researchers expose large-scale YouTube malware distribution network
23
Oct
2025

Researchers expose large-scale YouTube malware distribution network

Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed…