Category: HelpnetSecurity

Vulnerabilities found in NASA's open source software
27
May
2025

Vulnerabilities found in NASA’s open source software

Vulnerabilities in open source software developed and used in-house by NASA could be exploited to breach their systems, claims Leon…

Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group
27
May
2025

Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group

The Dutch intelligence and security services have identified a new Russia-affiliated threat group that has been breaching government organizations and…

New MCP server from groundcover redefines LLM observability
27
May
2025

New MCP server from groundcover redefines LLM observability

A new MCP server, faster than any other on the market, is launching today from groundcover, the eBPF-driven observability platform….

4.5% of breaches now extend to fourth parties
27
May
2025

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk…

How AI agents reshape industrial automation and risk management
27
May
2025

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the…

How well do you know your remote IT worker?
27
May
2025

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into…

Cybersecurity jobs available right now: May 27, 2025
27
May
2025

Cybersecurity jobs available right now: May 27, 2025

Application Security Engineer, SDO AppSec Amazon | EMEA | Hybrid – View job details As an Application Security Engineer, SDO…

NIST proposes new metric to gauge exploited vulnerabilities
26
May
2025

NIST proposes new metric to gauge exploited vulnerabilities

NIST has introduced a new way to estimate which software vulnerabilities have likely been exploited, and it’s calling on the…

Why layoffs increase cybersecurity risks
26
May
2025

Why layoffs increase cybersecurity risks

A wave of layoffs has swept through the tech industry, leaving IT teams in a rush to revoke all access…

LlamaFirewall: Open-source framework to detect and mitigate AI centric security risks
26
May
2025

LlamaFirewall: Open-source framework to detect and mitigate AI centric security risks

LlamaFirewall is a system-level security framework for LLM-powered applications, built with a modular design to support layered, adaptive defense. It…

AI forces security leaders to rethink hybrid cloud strategies
26
May
2025

AI forces security leaders to rethink hybrid cloud strategies

Hybrid cloud infrastructure is under mounting strain from the growing influence of AI, according to Gigamon. Cyberthreats grow in scale…

Week in review: Trojanized KeePass allows ransomware attacks, cyber risks of AI hallucinations
25
May
2025

Week in review: Trojanized KeePass allows ransomware attacks, cyber risks of AI hallucinations

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Trojanized KeePass opens doors for…