Category: HelpnetSecurity

The state of DMARC adoption: What 10M domains reveal
11
Sep
2025

The state of DMARC adoption: What 10M domains reveal

In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption…

Why organizations need a new approach to risk management
11
Sep
2025

Why organizations need a new approach to risk management

To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk…

Lookout’s AI-powered solution combats SMS phishing attacks
10
Sep
2025

Lookout’s AI-powered solution combats SMS phishing attacks

Lookout introduces Smishing AI, an AI-powered solution designed to protect enterprises from the growing threat of SMS phishing (smishing) attacks….

Microsoft, Adobe, SAP deliver critical fixes for September 2025 Patch Tuesday
10
Sep
2025

Microsoft, Adobe, SAP deliver critical fixes for September 2025 Patch Tuesday

On September 2025 Patch Tuesday, Microsoft has released patches for 80+ vulnerabilities in its various software products, but the good…

Gigamon Insights delivers agentic AI for threat detection, compliance, and root-cause analysis
10
Sep
2025

Gigamon Insights delivers agentic AI for threat detection, compliance, and root-cause analysis

Gigamon has released Gigamon Insights, an agentic AI application purpose-built for network-derived telemetry that will deliver instant guidance for security…

AI agents are here, now comes the hard part for CISOs
10
Sep
2025

AI agents are here, now comes the hard part for CISOs

AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for…

Deepfakes are rewriting the rules of geopolitics
10
Sep
2025

Deepfakes are rewriting the rules of geopolitics

Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust…

Garak: Open-source LLM vulnerability scanner
10
Sep
2025

Garak: Open-source LLM vulnerability scanner

LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is…

Fixing silent failures in security controls with adversarial exposure validation
10
Sep
2025

Fixing silent failures in security controls with adversarial exposure validation

Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are…

CISOs, stop chasing vulnerabilities and start managing human risk
10
Sep
2025

CISOs, stop chasing vulnerabilities and start managing human risk

Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025…

Plex tells users to change passwords due to data breach, pushes server owners to upgrade
09
Sep
2025

Plex tells users to change passwords due to data breach, pushes server owners to upgrade

Media streaming company Plex has suffered a data breach and is urging users to reset their account password and enable…

Fake npm 2FA reset email led to compromise of popular code packages
09
Sep
2025

Fake npm 2FA reset email led to compromise of popular code packages

Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the…