Category: HelpnetSecurity

Doppel Simulation combats social engineering attacks
21
Aug
2025

Doppel Simulation combats social engineering attacks

Doppel announced Doppel Simulation, a new product and expansion to the Doppel Vision Platform that enables organizations to redefine security…

Using lightweight LLMs to cut incident response times and reduce hallucinations
21
Aug
2025

Using lightweight LLMs to cut incident response times and reduce hallucinations

Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident…

Fractional vs. full-time CISO: Finding the right fit for your company
21
Aug
2025

Fractional vs. full-time CISO: Finding the right fit for your company

In this Help Net Security interview, Nikoloz Kokhreidze, Fractional CISO at Mandos, discusses why many early- and growth-stage B2B companies…

Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
21
Aug
2025

Product showcase: iStorage datAshur PRO+C encrypted USB flash drive

The iStorage datAshur PRO+C is a USB-C flash drive featuring AES-XTS 256-bit hardware encryption. Available in capacities from 32 GB…

URL-based threats become a go-to tactic for cybercriminals
21
Aug
2025

URL-based threats become a go-to tactic for cybercriminals

Cybercriminals are using advanced social engineering and AI-generated content to make malicious URLs difficult for users to identify, according to…

Apple fixes zero-day vulnerability exploited in "extremely sophisticated attack" (CVE-2025-43300)
20
Aug
2025

Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)

Apple has fixed yet another vulnerability (CVE-2025-43300) that has apparently been exploited as a zero-day “in an extremely sophisticated attack…

Commvault plugs holes in backup suite that allow remote code execution
20
Aug
2025

Commvault plugs holes in backup suite that allow remote code execution

Commvault has fixed four security vulnerabilities that may allow unauthenticated attackers to compromise on-premises deployments of its flagship backup and…

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)
20
Aug
2025

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)

A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has…

iOS security features you should use to protect your privacy
20
Aug
2025

iOS security features you should use to protect your privacy

iOS 18 comes with several privacy and security features that many iPhone users overlook. Knowing how to use them can…

LudusHound: Open-source tool brings BloodHound data to life
20
Aug
2025

LudusHound: Open-source tool brings BloodHound data to life

LudusHound is an open-source tool that takes BloodHound data and uses it to set up a working Ludus Range for…

The AI security crisis no one is preparing for
20
Aug
2025

The AI security crisis no one is preparing for

In this Help Net Security interview, Jacob Ideskog, CTO of Curity, discusses the risks AI agents pose to organizations. As…

Why CISOs in business services must close the edge security gap
20
Aug
2025

Why CISOs in business services must close the edge security gap

Cloud adoption is speeding ahead in the business services sector, but security for remote and edge environments is falling behind….