Category: HelpnetSecurity

Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft breach
02
Sep
2025

Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft breach

In the wake of last week’s revelation of a breach at Salesloft by a group tracked by Google as UNC6395,…

Can AI agents catch what your SOC misses?
02
Sep
2025

Can AI agents catch what your SOC misses?

A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team…

Complexity and AI put identity protection to the test
02
Sep
2025

Complexity and AI put identity protection to the test

Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity…

Cybersecurity jobs available right now: September 2, 2025
02
Sep
2025

Cybersecurity jobs available right now: September 2, 2025

CISO Shift Technology | France | Remote – View job details As a CISO, you will develop and execute a…

GenAI is fueling smarter fraud, but broken teamwork is the real problem
01
Sep
2025

GenAI is fueling smarter fraud, but broken teamwork is the real problem

More than 80 percent of large U.S. companies were targeted by socially engineered fraud in the past year, according to…

AIDEFEND: Free AI defense framework
01
Sep
2025

AIDEFEND: Free AI defense framework

AIDEFEND (Artificial Intelligence Defense Framework) is an open knowledge base dedicated to AI security, providing defensive countermeasures and best practices…

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior
01
Sep
2025

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

A team of researchers from Frondeur Labs, DistributedApps.ai, and OWASP has developed a new machine learning framework designed to help…

Boards are being told to rethink their role in cybersecurity
01
Sep
2025

Boards are being told to rethink their role in cybersecurity

Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must…

Cybersecurity signals: Connecting controls and incident outcomes
01
Sep
2025

Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study…

Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw
31
Aug
2025

Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server instances…

Attackers use "Contact Us" forms and fake NDAs to phish industrial manufacturing firms
29
Aug
2025

Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms

A recently uncovered phishing campaign – carefully designed to bypass security defenses and avoid detection by its intended victims –…

New framework aims to outsmart malware evasion tricks
29
Aug
2025

New framework aims to outsmart malware evasion tricks

Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they…