Category: HelpnetSecurity

Cybersecurity research is getting new ethics rules, here's what you need to know
08
Sep
2025

Cybersecurity research is getting new ethics rules, here’s what you need to know

Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the…

AI moves fast, but data security must move faster
08
Sep
2025

AI moves fast, but data security must move faster

Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and…

Identity management was hard, AI made it harder
08
Sep
2025

Identity management was hard, AI made it harder

Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from…

Week in review: Several companies affected by the Salesloft Drift breach, Sitecore 0-day vulnerability
07
Sep
2025

Week in review: Several companies affected by the Salesloft Drift breach, Sitecore 0-day vulnerability

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zscaler, Palo Alto Networks, SpyCloud…

Stealthy attack serves poisoned web pages only to AI agents
05
Sep
2025

Stealthy attack serves poisoned web pages only to AI agents

AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users’ view, JFrog…

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
05
Sep
2025

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)

A critical vulnerability (CVE-2025-42957) in SAP S/4HANA enterprise resource planning software is being exploited by attackers “to a limited extent”,…

September 2025 Patch Tuesday forecast: The CVE matrix
05
Sep
2025

September 2025 Patch Tuesday forecast: The CVE matrix

We work in an industry driven by Common Vulnerabilities and Exposures (CVE). Each security update released by myriad vendors addresses…

How to reclaim control over your online shopping data
05
Sep
2025

How to reclaim control over your online shopping data

Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to…

Smart ways CISOs can do more with less
05
Sep
2025

Smart ways CISOs can do more with less

In this Help Net Security video, Jill Knesek, CISO at BlackLine, shares practical strategies for CISOs navigating tighter budgets. From…

Connected cars are smart, convenient, and open to cyberattacks
05
Sep
2025

Connected cars are smart, convenient, and open to cyberattacks

Consumers are concerned about vulnerabilities in their vehicles, which directly impacts purchasing behavior and brand loyalty, according to RunSafe Security….

Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
04
Sep
2025

Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)

Google has provided fixes for over 100 Android vulnerabilities, including CVE-2025-48543 and CVE-2025-38352, which “may be under limited, targeted exploitation.”…

macOS vulnerability allowed Keychain and iOS app decryption without a password
04
Sep
2025

macOS vulnerability allowed Keychain and iOS app decryption without a password

Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability (CVE-2025-24204) that allowed attackers to read the memory of any…