Category: HelpnetSecurity

CISA looks to partners to shore up the future of the CVE Program
12
Sep
2025

CISA looks to partners to shore up the future of the CVE Program

The US Cybersecurity and Infrastructure Security Agency (CISA) has affirmed its continuing support for the Common Vulnerabilities and Exposures (CVE)…

Attackers are coming for drug formulas and patient data
12
Sep
2025

Attackers are coming for drug formulas and patient data

In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value…

Your heartbeat could reveal your identity, even in anonymized datasets
12
Sep
2025

Your heartbeat could reveal your identity, even in anonymized datasets

A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to…

CISOs brace for a new kind of AI chaos
12
Sep
2025

CISOs brace for a new kind of AI chaos

AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are…

Ransomware, vendor outages, and AI attacks are hitting harder in 2025
12
Sep
2025

Ransomware, vendor outages, and AI attacks are hitting harder in 2025

Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear…

New infosec products of the week: September 12, 2025
12
Sep
2025

New infosec products of the week: September 12, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and…

Akira ransomware affiliates continue breaching organizations via SonicWall firewalls
11
Sep
2025

Akira ransomware affiliates continue breaching organizations via SonicWall firewalls

Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a…

Default Cursor setting can be exploited to run malicious code on developers' machines
11
Sep
2025

Default Cursor setting can be exploited to run malicious code on developers’ machines

An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code…

Cynomi simplifies vendor risk management
11
Sep
2025

Cynomi simplifies vendor risk management

Cynomi has launched its Third-Party Risk Management (TPRM) module. Delivered as an add-on to the Cynomi vCISO Platform, the new…

AI is everywhere, but scaling it is another story
11
Sep
2025

AI is everywhere, but scaling it is another story

AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say…

When typing becomes tracking: Study reveals widespread silent keystroke interception
11
Sep
2025

When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up…

How attackers weaponize communications networks
11
Sep
2025

How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks…