Category: HelpnetSecurity

How a fake ICS network can reveal real cyberattacks
17
Sep
2025

How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet…

Creating a compliance strategy that works across borders
17
Sep
2025

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving…

Bots vs. humans? Why intent is the game-changer
17
Sep
2025

Bots vs. humans? Why intent is the game-changer

In this Help Net Security video, Jérôme Segura, VP of Threat Research at Datadome, explains why intent, not just identifying…

Old file types, new tricks: Attackers turn everyday files into weapons
17
Sep
2025

Old file types, new tricks: Attackers turn everyday files into weapons

Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that…

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack
16
Sep
2025

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

A potentially monumental supply chain attack is underway, thanks to a self-replicating worm-like payload that has been compromising packages published…

Neon Cyber exits stealth with Workforce Cybersecurity Platform
16
Sep
2025

Neon Cyber exits stealth with Workforce Cybersecurity Platform

Neon Cyber announced its emergence from stealth and unveiled the first Workforce Cybersecurity Platform (WCP), delivering protection across browsers, SaaS…

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents
16
Sep
2025

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents

All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any mistake…

GitHub adds post-quantum protection for SSH access
16
Sep
2025

GitHub adds post-quantum protection for SSH access

GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when…

OT security needs continuous operations, not one-time fixes
16
Sep
2025

OT security needs continuous operations, not one-time fixes

Cyberattacks keep hitting the OT systems that critical infrastructure operators run, according to new research from Forrester. In a survey…

Google introduces VaultGemma, a differentially private LLM built for secure data handling
16
Sep
2025

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential…

Building security that protects customers, not just auditors
16
Sep
2025

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the…

AI video surveillance could end privacy as we know it
16
Sep
2025

AI video surveillance could end privacy as we know it

AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on…