Category: HelpnetSecurity

Arkime: Open-source network analysis and packet capture system
15
Sep
2025

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to…

Week in review: Salesloft Drift breach investigation results, malicious GitHub Desktop installers
14
Sep
2025

Week in review: Salesloft Drift breach investigation results, malicious GitHub Desktop installers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Salesloft Drift data breach: Investigation…

HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot
12
Sep
2025

HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot

ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware, augmented with the capability…

CISA looks to partners to shore up the future of the CVE Program
12
Sep
2025

CISA looks to partners to shore up the future of the CVE Program

The US Cybersecurity and Infrastructure Security Agency (CISA) has affirmed its continuing support for the Common Vulnerabilities and Exposures (CVE)…

Attackers are coming for drug formulas and patient data
12
Sep
2025

Attackers are coming for drug formulas and patient data

In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value…

Your heartbeat could reveal your identity, even in anonymized datasets
12
Sep
2025

Your heartbeat could reveal your identity, even in anonymized datasets

A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to…

CISOs brace for a new kind of AI chaos
12
Sep
2025

CISOs brace for a new kind of AI chaos

AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are…

Ransomware, vendor outages, and AI attacks are hitting harder in 2025
12
Sep
2025

Ransomware, vendor outages, and AI attacks are hitting harder in 2025

Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear…

New infosec products of the week: September 12, 2025
12
Sep
2025

New infosec products of the week: September 12, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and…

Akira ransomware affiliates continue breaching organizations via SonicWall firewalls
11
Sep
2025

Akira ransomware affiliates continue breaching organizations via SonicWall firewalls

Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a…

Default Cursor setting can be exploited to run malicious code on developers' machines
11
Sep
2025

Default Cursor setting can be exploited to run malicious code on developers’ machines

An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code…

Cynomi simplifies vendor risk management
11
Sep
2025

Cynomi simplifies vendor risk management

Cynomi has launched its Third-Party Risk Management (TPRM) module. Delivered as an add-on to the Cynomi vCISO Platform, the new…