Category: HelpnetSecurity

Android VPN apps used by millions are covertly connected AND insecure
19
Aug
2025

Android VPN apps used by millions are covertly connected AND insecure

Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a…

What happens when penetration testing goes virtual and gets an AI coach
19
Aug
2025

What happens when penetration testing goes virtual and gets an AI coach

Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to…

Git 2.51: Preparing for the future with SHA-256
19
Aug
2025

Git 2.51: Preparing for the future with SHA-256

Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes…

The cybersecurity myths companies can’t seem to shake
19
Aug
2025

The cybersecurity myths companies can’t seem to shake

Cybersecurity myths are like digital weeds: pull one out, and another quickly sprouts in its place. You’ve probably heard them…

Cybersecurity jobs available right now: August 19, 2025
19
Aug
2025

Cybersecurity jobs available right now: August 19, 2025

Senior Cybersecurity Analyst DOT Security | USA | On-site – View job details As a Senior Cybersecurity Analyst, you will…

New NIST guide explains how to detect morphed images
18
Aug
2025

New NIST guide explains how to detect morphed images

Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks…

Noodlophile infostealer is hiding behind fake copyright and PI infringement notices
18
Aug
2025

Noodlophile infostealer is hiding behind fake copyright and PI infringement notices

Attackers pushing the Noodlophile infostealer are targeting businesses with spear-phishing emails threatening legal action due to copyright or intellectual property…

Review: Data Engineering for Cybersecurity
18
Aug
2025

Review: Data Engineering for Cybersecurity

Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the…

How security teams are putting AI to work right now
18
Aug
2025

How security teams are putting AI to work right now

AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert…

Buttercup: Open-source AI-driven system detects and patches vulnerabilities
18
Aug
2025

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits,…

Weak alerting and slipping prevention raise risk levels for CISOs
18
Aug
2025

Weak alerting and slipping prevention raise risk levels for CISOs

Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft…

Bridging the AI model governance gap: Key findings for CISOs
18
Aug
2025

Bridging the AI model governance gap: Key findings for CISOs

While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could…