Category: HelpnetSecurity

Hottest cybersecurity open-source tools of the month: August 2025
27
Aug
2025

Hottest cybersecurity open-source tools of the month: August 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source…

AI Security Map: Linking AI vulnerabilities to real-world impact
27
Aug
2025

AI Security Map: Linking AI vulnerabilities to real-world impact

A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours….

How compliance teams can turn AI risk into opportunity
27
Aug
2025

How compliance teams can turn AI risk into opportunity

AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new…

What CISOs can learn from Doppel's new AI-driven social engineering simulation
27
Aug
2025

What CISOs can learn from Doppel’s new AI-driven social engineering simulation

Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool…

Social media apps that aggressively harvest user data
27
Aug
2025

Social media apps that aggressively harvest user data

Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some…

NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)
26
Aug
2025

NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)

Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of which…

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
26
Aug
2025

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)

CVE-2025-48384, a recently patched vulnerability in the popular distributed revision control system Git, is being exploited by attackers. Details about…

Protecting farms from hackers: A Q&A with John Deere's Deputy CISO
26
Aug
2025

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO

Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in…

The energy sector has no time to wait for the next cyberattack
26
Aug
2025

The energy sector has no time to wait for the next cyberattack

The energy sector remains a major target for cybercriminals. Beyond disrupting daily routines, a power outage can undermine economic stability…

LLMs at the edge: Rethinking how IoT devices talk and act
26
Aug
2025

LLMs at the edge: Rethinking how IoT devices talk and act

Anyone who has set up a smart home knows the routine: one app to dim the lights, another to adjust…

Cybersecurity jobs available right now: August 26, 2025
26
Aug
2025

Cybersecurity jobs available right now: August 26, 2025

Sr. Cybersecurity Analyst Aecon Group Inc. | USA | On-site – View job details As a Sr. Cybersecurity Analyst, you…

ScreenConnect admins targeted with spoofed login alerts
25
Aug
2025

ScreenConnect admins targeted with spoofed login alerts

ScreenConnect cloud administrators across all region and industries are being targeted with fake email alerts warning about a potentially suspicious…