Category: HelpnetSecurity

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
28
Jul
2025

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how…

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job
27
Jul
2025

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft pins on-prem SharePoint attacks…

Six months into DORA, most financial firms are still not ready
25
Jul
2025

Six months into DORA, most financial firms are still not ready

It’s been six months since the EU’s Digital Operational Resilience Act (DORA) came into effect, but a new Censuswide survey…

Digital sovereignty becomes a matter of resilience for Europe
25
Jul
2025

Digital sovereignty becomes a matter of resilience for Europe

In this Help Net Security interview, Benjamin Schilz, CEO of Wire, discusses Europe’s push for digital sovereignty through initiatives like…

What 50 companies got wrong about cloud identity security
25
Jul
2025

What 50 companies got wrong about cloud identity security

Most organizations still miss basic identity security controls in the cloud, leaving them exposed to breaches, audit failures, and compliance…

New infosec products of the week: July 25, 2025
25
Jul
2025

New infosec products of the week: July 25, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Akeyless, Bitdefender, Malwarebytes, ManageEngine, PlexTrac,…

Storm-2603 spotted deploying ransomware on exploited SharePoint servers
24
Jul
2025

Storm-2603 spotted deploying ransomware on exploited SharePoint servers

One of the groups that, in the past few weeks, has been exploiting vulnerabilities in on-prem SharePoint installation has been…

CISO New York 2025 brings together top cybersecurity leaders
24
Jul
2025

CISO New York 2025 brings together top cybersecurity leaders

The annual CISO New York summit will be held on September 9, 2025, uniting over 150 senior cybersecurity executives for…

Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)
24
Jul
2025

Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)

Sonicwall is asking customers running specific Secure Mobile Access (SMA) 100 Series devices to patch a newly uncovered vulnerability (CVE-2025-40599)…

Why outsourcing cybersecurity is rising in the Adriatic region
24
Jul
2025

Why outsourcing cybersecurity is rising in the Adriatic region

In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the…

Autoswagger: Open-source tool to expose hidden API authorization flaws
24
Jul
2025

Autoswagger: Open-source tool to expose hidden API authorization flaws

Autoswagger is a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even…

Your app is under attack every 3 minutes
24
Jul
2025

Your app is under attack every 3 minutes

Application-layer attacks have become one of the most common and consequential methods adversaries use to gain access and compromise organizations,…