Category: HelpnetSecurity

Cybersecurity signals: Connecting controls and incident outcomes
01
Sep
2025

Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study…

Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw
31
Aug
2025

Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server instances…

Attackers use "Contact Us" forms and fake NDAs to phish industrial manufacturing firms
29
Aug
2025

Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms

A recently uncovered phishing campaign – carefully designed to bypass security defenses and avoid detection by its intended victims –…

New framework aims to outsmart malware evasion tricks
29
Aug
2025

New framework aims to outsmart malware evasion tricks

Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they…

Finding connection and resilience as a CISO
29
Aug
2025

Finding connection and resilience as a CISO

With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have…

AI can't deliver without trusted, well-governed information
29
Aug
2025

AI can’t deliver without trusted, well-governed information

While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to…

Infosec products of the month: August 2025
29
Aug
2025

Infosec products of the month: August 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Black Kite, Brivo, Cloudflare, Descope,…

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations
28
Aug
2025

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations

Cybercriminals have started “vibe hacking” with AI’s help, AI startup Anthropic has shared in a report released on Wednesday. An…

Maritime cybersecurity is the iceberg no one sees coming
28
Aug
2025

Maritime cybersecurity is the iceberg no one sees coming

Maritime transport, the backbone of global trade, is adapting to shifting economic, political, and technological conditions. Advances in technology have…

ScamAgent shows how AI could power the next wave of scam calls
28
Aug
2025

ScamAgent shows how AI could power the next wave of scam calls

Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get…

Where security, DevOps, and data science finally meet on AI strategy
28
Aug
2025

Where security, DevOps, and data science finally meet on AI strategy

AI infrastructure is expensive, complex, and often caught between competing priorities. On one side, security teams want strong isolation and…

Can AI make threat intelligence easier? One platform thinks so
28
Aug
2025

Can AI make threat intelligence easier? One platform thinks so

When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t…