Category: HelpnetSecurity

NETSCOUT’s KlearSight Sensor delivers visibility into encrypted Kubernetes environments
23
Oct
2025

NETSCOUT’s KlearSight Sensor delivers visibility into encrypted Kubernetes environments

NETSCOUT announced an innovation designed to meet organizations’ needs for observability within complex cloud environments. With the demands of large,…

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)
23
Oct
2025

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

Attackers are trying to exploit CVE-2025-54236, a critical vulnerability affecting Adobe Commerce and Magento Open Source, Sansec researchers have warned….

How Lazarus Group used fake job ads to spy on Europe's drone and defense sector
23
Oct
2025

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This…

Faster LLM tool routing comes with new security considerations
23
Oct
2025

Faster LLM tool routing comes with new security considerations

Large language models depend on outside tools to perform real-world tasks, but connecting them to those tools often slows them…

Your wearable knows your heartbeat, but who else does?
23
Oct
2025

Your wearable knows your heartbeat, but who else does?

Smartwatches, glucose sensors, and connected drug-monitoring devices are common in care programs. Remote monitoring helps detect changes early and supports…

The next cyber crisis may start in someone else's supply chain
23
Oct
2025

The next cyber crisis may start in someone else’s supply chain

Organizations are getting better at some aspects of risk management but remain underprepared for the threats reshaping the business landscape,…

Gartner predicts the technologies set to transform 2026
23
Oct
2025

Gartner predicts the technologies set to transform 2026

Gartner has unveiled its vision for the technologies that will define 2026, spotlighting the innovations and risks that business and…

Attackers target retailers’ gift card systems using cloud-only techniques
22
Oct
2025

Attackers target retailers’ gift card systems using cloud-only techniques

A newly uncovered attack campaign mounted by suspected Morocco-based attackers has been hitting global retailers and other businesses issuing gift…

Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails
22
Oct
2025

Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails

Rubrik announced the launch of the Rubrik Agent Cloud to accelerate enterprise AI agent adoption while managing risk of AI…

Attackers turn trusted OAuth apps into cloud backdoors
22
Oct
2025

Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often…

Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team
22
Oct
2025

Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team

Axoflow has launched its Security Data Layer, extending its pipeline offering with multiple storage solutions. The Security Data Layer addresses…

Elastic introduces Agent Builder to simplify AI agent development
22
Oct
2025

Elastic introduces Agent Builder to simplify AI agent development

Elastic released Agent Builder, a complete set of capabilities powered by Elasticsearch, that makes it easy for developers to build…