Category: HelpnetSecurity

StealthMACsec strengthens Ethernet network security
03
Jul
2025

StealthMACsec strengthens Ethernet network security

StealthCores launched StealthMACsec, a comprehensive IEEE 802.1AE compliant MACsec engine that brings advanced side-channel countermeasures to Ethernet network security. Building…

GitPhish: Open-source GitHub device code flow security assessment tool
03
Jul
2025

GitPhish: Open-source GitHub device code flow security assessment tool

GitPhish is an open-source security research tool built to replicate GitHub’s device code authentication flow. It features three core operating…

Cyberattacks are draining millions from the hospitality industry
03
Jul
2025

Cyberattacks are draining millions from the hospitality industry

Every day, millions of travelers share sensitive information like passports, credit card numbers, and personal details with hotels, restaurants, and…

AI tools are everywhere, and most are off your radar
03
Jul
2025

AI tools are everywhere, and most are off your radar

80% of AI tools used by employees go unmanaged by IT or security teams, according to Zluri’s The State of…

Industrial security is on shaky ground and leaders need to pay attention
03
Jul
2025

Industrial security is on shaky ground and leaders need to pay attention

44% of industrial organizations claim to have strong real-time cyber visibility, but nearly 60% have low to no confidence in…

Qantas data breach could affect 6 million customers
02
Jul
2025

Qantas data breach could affect 6 million customers

Qantas has suffered a cyber incident that has lead to a data breach. “The incident occurred when a cyber criminal…

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
02
Jul
2025

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC

The Apricorn Aegis Secure Key 3NXC is a 256-bit AES XTS hardware-encrypted flash drive with a USB-C connector. It is…

Cybersecurity essentials for the future: From hype to what works
02
Jul
2025

Cybersecurity essentials for the future: From hype to what works

Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut….

How FinTechs are turning GRC into a strategic enabler
02
Jul
2025

How FinTechs are turning GRC into a strategic enabler

In this Help Net Security interview, Alexander Clemm, Corp GRC Lead, Group CISO, and BCO at Riverty, shares how the…

Secretless Broker: Open-source tool connects apps securely without passwords or keys
02
Jul
2025

Secretless Broker: Open-source tool connects apps securely without passwords or keys

Secretless Broker is an open-source connection broker that eliminates the need for client applications to manage secrets when accessing target…

Scammers are trick­ing travelers into booking trips that don't exist
02
Jul
2025

Scammers are trick­ing travelers into booking trips that don’t exist

Not long ago, travelers worried about bad weather. Now, they’re worried the rental they booked doesn’t even exist. With AI-generated…

Microsoft introduces protection against email bombing
01
Jul
2025

Microsoft introduces protection against email bombing

By the end of July 2025, all Microsoft Defender for Office 365 customers should be protected from email bombing attacks…