Category: HelpnetSecurity

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks
26
Sep
2025

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks

A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been revealed by…

Infosec products of the month: September 2025
26
Sep
2025

Infosec products of the month: September 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Blackdot Solutions, Catchpoint,…

Ransomware groups are multiplying, raising the stakes for defenders
26
Sep
2025

Ransomware groups are multiplying, raising the stakes for defenders

Ransomware activity is climbing again, with a steep increase in the number of victims and the number of groups launching…

Inside the economy built on stolen credentials
26
Sep
2025

Inside the economy built on stolen credentials

Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A…

Delinea releases free open-source MCP server to secure AI agents
26
Sep
2025

Delinea releases free open-source MCP server to secure AI agents

AI agents are becoming more common in the workplace, but giving them access to sensitive systems can be risky. Credentials…

How agentic AI is changing the SOC
26
Sep
2025

How agentic AI is changing the SOC

In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security…

European Windows 10 users get an additional year of free security updates
25
Sep
2025

European Windows 10 users get an additional year of free security updates

Windows 10 users in the European Economic Area (EEA) will be able to receive extended security updates until October 14,…

Microsoft spots LLM-obfuscated phishing attack
25
Sep
2025

Microsoft spots LLM-obfuscated phishing attack

Cybercriminals are increasingly using AI-powered tools and (malicious) large language models to create convincing, error-free emails, deepfakes, online personas, lookalike/fake…

North Korean IT workers use fake profiles to steal crypto
25
Sep
2025

North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active…

GenAI is exposing sensitive data at scale
25
Sep
2025

GenAI is exposing sensitive data at scale

Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and…

Secure Code Warrior gives CISOs visibility into developer AI tool usage
25
Sep
2025

Secure Code Warrior gives CISOs visibility into developer AI tool usage

Secure Code Warrior has launched a beta program to expand the AI capabilities of its Trust Agent product. The new…

The fight to lock down drones and their supply chains
25
Sep
2025

The fight to lock down drones and their supply chains

Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors….