Category: HelpnetSecurity

Building a mature automotive cybersecurity program beyond checklists
02
Oct
2025

Building a mature automotive cybersecurity program beyond checklists

In this Help Net Security interview, Robert Sullivan, CIO & CISO at Agero, shares his perspective on automotive cybersecurity. He…

GPT needs to be rewired for security
02
Oct
2025

GPT needs to be rewired for security

LLMs and agentic systems already shine at everyday productivity, including transcribing and summarizing meetings, extracting action items, prioritizing critical emails,…

The energy sector is ground zero for global cyber activity
02
Oct
2025

The energy sector is ground zero for global cyber activity

A new study from the Karlsruhe Institute of Technology shows how geopolitical tensions shape cyberattacks on power grids, fuel systems,…

Biotech platforms keep missing the mark on security fundamentals
02
Oct
2025

Biotech platforms keep missing the mark on security fundamentals

A new security posture report on the biotech sector shows how quickly attackers could reach sensitive health data with only…

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S.
01
Oct
2025

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S.

North Korea’s clandestine IT Worker (ITW) program, which is long known for targeting U.S. technology firms and crypto firms, has…

Google Drive for desktop will spot, stop and remedy ransomware damage
01
Oct
2025

Google Drive for desktop will spot, stop and remedy ransomware damage

Google has rolled out AI-powered ransomware detection and file restoration features in Drive for desktop, Google’s official file syncing and…

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale
01
Oct
2025

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale

TELUS Digital has released its continuous automated red-teaming application, Fuel iX Fortify. The solution helps enterprises test GenAI systems at…

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts
01
Oct
2025

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts

Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco Adaptive Security…

Siemens simplifies OT security with virtualized, encrypted connectivity
01
Oct
2025

Siemens simplifies OT security with virtualized, encrypted connectivity

Siemens launched SINEC Secure Connect, the zero trust security platform designed for operational technology (OT) networks. The software solution virtualizes…

Biometric spoofing isn’t as complex as it sounds
01
Oct
2025

Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t…

Hackers love LOTL, this approach shuts them down
01
Oct
2025

Hackers love LOTL, this approach shuts them down

Every time cyber defenders and companies discover new ways to block intrusions, attackers change their tactics and find a way…

A2AS framework targets prompt injection and agentic AI security risks
01
Oct
2025

A2AS framework targets prompt injection and agentic AI security risks

AI systems are now deeply embedded in business operations, and this introduces new security risks that traditional controls are not…