Category: HelpnetSecurity

When everything's connected, everything's at risk
21
Oct
2025

When everything’s connected, everything’s at risk

In this Help Net Security interview, Ken Deitz, CISO at Brown & Brown, discusses how the definition of cyber risk…

Your smart building isn't so smart without security
21
Oct
2025

Your smart building isn’t so smart without security

The lights switch on as you walk in. The air adjusts to your presence. Somewhere in the background, a server…

AI's split personality: Solving crimes while helping conceal them
21
Oct
2025

AI’s split personality: Solving crimes while helping conceal them

What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace…

10 data security companies to watch in 2026
21
Oct
2025

10 data security companies to watch in 2026

At Help Net Security, we’ve been tracking the cybersecurity world for nearly three decades. Through our Industry News section, we’ve…

Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
20
Oct
2025

Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)

Moxa has fixed 5 vulnerabilities in its industrial network security appliances and routers, including a remotely exploitable flaw (CVE-2025-6950) that…

China-linked Salt Typhoon hackers attempt to infiltrate European telco
20
Oct
2025

China-linked Salt Typhoon hackers attempt to infiltrate European telco

Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak…

Inside the messy reality of Microsoft 365 management
20
Oct
2025

Inside the messy reality of Microsoft 365 management

Most MSPs agree that Microsoft 365 is now the backbone of business operations, but a Syncro survey shows that complexity,…

Most AI privacy research looks the wrong way
20
Oct
2025

Most AI privacy research looks the wrong way

Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie…

Why ex-military professionals are a good fit for cybersecurity
20
Oct
2025

Why ex-military professionals are a good fit for cybersecurity

After years of working as part of a team, many military veterans look for work that still carries meaning, challenge,…

Nodepass: Open-source TCP/UDP tunneling solution
20
Oct
2025

Nodepass: Open-source TCP/UDP tunneling solution

When you think of network tunneling, “lightweight” and “enterprise-grade” rarely appear in the same sentence. NodePass, an open-source project, wants…

Why cybersecurity hiring feels so hard right now
20
Oct
2025

Why cybersecurity hiring feels so hard right now

In this Help Net Security video, Carol Lee Hobson, CISO at PayNearMe, explores the realities behind the so-called cybersecurity “talent…

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days
19
Oct
2025

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building a healthcare cybersecurity strategy…