Category: HelpnetSecurity
The volume of threat intelligence data has grown exponentially, but the ability to interpret and act on it has not….
A spear-phishing campaign aimed to compromise Russian and Belarusian military personnel by using military-themed documents as a lure has been…
Static credentials have been a weak point in cloud security for years. A new paper by researchers from SentinelOne takes…
Heisenberg is an open-source tool that checks the health of a software supply chain. It analyzes dependencies using data from…
AI, SaaS, and personal devices are changing how people get work done, but the tools that protect company systems have…
Caller ID spoofing has become one of Europe’s most persistent enablers of cyber fraud. A new position paper from Europol…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Can your earbuds recognize you?…
A Windows vulnerability (CVE-2025-9491, aka ZDI-CAN-25373) that state-sponsored threat actors and cybercrime groups have been quietly leveraging since at least…
In partnership with international cybersecurity agencies, the US Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA)…
AI chat tools are taking over offices, but at what cost to privacy? People often feel anonymous in chat interfaces…
ImmuniWeb has unveiled an upgraded version of ImmuniWeb Continuous, designed for continuous penetration testing and 24/7 automated vulnerability scanning of…
Shadow AI is the second-most prevalent form of shadow IT in corporate environments, 1Password’s latest annual report has revealed. Based…











