Category: HelpnetSecurity

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
15
Jul
2025

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation

UEFI firmware running on 100+ Gigabyte motherboard models is affected by memory corruption vulnerabilities that may allow attackers to install…

AsyncRAT evolves as ESET tracks its most popular malware forks
15
Jul
2025

AsyncRAT evolves as ESET tracks its most popular malware forks

AsyncRAT is an open-source remote access trojan that first appeared on GitHub in 2019. It includes a range of typical…

Securing vehicles as they become platforms for code and data
15
Jul
2025

Securing vehicles as they become platforms for code and data

In this Help Net Security interview, Robert Knoblauch, CISO at Element Fleet Management, discusses how the rise of connected vehicles…

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
15
Jul
2025

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech

For decades, manufacturers and security professionals have been playing a high-stakes game of cat and mouse with counterfeiters. From holograms…

How service providers can turn cybersecurity into a scalable MRR engine
15
Jul
2025

How service providers can turn cybersecurity into a scalable MRR engine

A growing number of MSPs, MSSPs, and consultancies are moving beyond one-and-done engagements and transforming from tactical vendors into strategic…

Stop settling for check-the-box cybersecurity policies
15
Jul
2025

Stop settling for check-the-box cybersecurity policies

After every breach, people ask: How did this happen if there were cybersecurity policies in place? The truth is, just…

Cybersecurity jobs available right now: July 15, 2025
15
Jul
2025

Cybersecurity jobs available right now: July 15, 2025

Application Penetration Tester Tata Consultancy Services | Ireland | Hybrid – View job details As an Application Penetration Tester, you…

New MITRE framework takes aim at crypto threats
14
Jul
2025

New MITRE framework takes aim at crypto threats

MITRE has introduced AADAPT (Adversarial Actions in Digital Asset Payment Technologies), a new cybersecurity framework designed to tackle vulnerabilities in…

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
14
Jul
2025

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)

With two proof-of-concept (PoC) exploits made public late last week, CVE-2025-25257 – a critical SQL command injection vulnerability in Fortinet’s…

Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience
14
Jul
2025

Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience

Stellar Cyber released version 6.0.0 of its award-winning open and unified SecOps Platform, introducing new AI-driven capabilities and workflow enhancements…

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
14
Jul
2025

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare

In this Help Net Security interview, Gail Hodges, Executive Director at the OpenID Foundation, discusses how the Foundation ensures global…

pqcscan: Open-source post-quantum cryptography scanner
14
Jul
2025

pqcscan: Open-source post-quantum cryptography scanner

pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms…