Category: HelpnetSecurity

Shadow AI is breaking corporate security from within
18
Sep
2025

Shadow AI is breaking corporate security from within

Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025…

Global hiring risks: What you need to know about identity fraud and screening trends
18
Sep
2025

Global hiring risks: What you need to know about identity fraud and screening trends

Hiring new employees has always carried some risk, but that risk is growing in new ways, and identity fraud is…

Many networking devices are still vulnerable to pixie dust attack
17
Sep
2025

Many networking devices are still vulnerable to pixie dust attack

Despite having been discovered and reported in 2014, the vulnerability that allows pixie dust attacks still impacts consumer and SOHO…

Nagomi Control reveals where organizations are most exposed
17
Sep
2025

Nagomi Control reveals where organizations are most exposed

Nagomi Security announced the next step in its platform evolution with Nagomi Control, a new release that enhances Continuous Threat…

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader
17
Sep
2025

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader

Microsoft and Cloudflare have disrupted a Phishing-as-a-Service operation selling the RaccoonO365 kit for stealing Microsoft 365 account credentials. “Using a…

Siren’s K9 uses AI to turn complex investigations into actionable insights
17
Sep
2025

Siren’s K9 uses AI to turn complex investigations into actionable insights

Siren announced the launch of K9, an AI companion designed to transform the way investigators uncover threats and connections. K9…

Rayhunter: EFF releases open-source tool to detect cellular spying
17
Sep
2025

Rayhunter: EFF releases open-source tool to detect cellular spying

The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These…

How a fake ICS network can reveal real cyberattacks
17
Sep
2025

How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet…

Creating a compliance strategy that works across borders
17
Sep
2025

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving…

Bots vs. humans? Why intent is the game-changer
17
Sep
2025

Bots vs. humans? Why intent is the game-changer

In this Help Net Security video, Jérôme Segura, VP of Threat Research at Datadome, explains why intent, not just identifying…

Old file types, new tricks: Attackers turn everyday files into weapons
17
Sep
2025

Old file types, new tricks: Attackers turn everyday files into weapons

Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that…

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack
16
Sep
2025

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

A potentially monumental supply chain attack is underway, thanks to a self-replicating worm-like payload that has been compromising packages published…