Category: HelpnetSecurity

Cloudflare secures sensitive data without fully restricting AI usage
25
Aug
2025

Cloudflare secures sensitive data without fully restricting AI usage

Cloudflare announced new capabilities for Cloudflare One, its zero trust platform, designed to help organizations securely adopt, build and deploy…

Fake macOS help sites push Shamos infostealer via ClickFix technique
25
Aug
2025

Fake macOS help sites push Shamos infostealer via ClickFix technique

Criminals are taking advantage of macOS users’ need to resolve technical issues to get them to infect their machines with…

Smart manufacturing demands workers with AI and cybersecurity skills
25
Aug
2025

Smart manufacturing demands workers with AI and cybersecurity skills

The manufacturing sector is entering a new phase of digital transformation. According to Rockwell Automation’s 10th Annual State of Smart…

Why satellite cybersecurity threats matter to everyone
25
Aug
2025

Why satellite cybersecurity threats matter to everyone

Satellites play a huge role in our daily lives, supporting everything from global communications to navigation, business, and national security….

Why a new AI tool could change how we test insider threat defenses
25
Aug
2025

Why a new AI tool could change how we test insider threat defenses

Insider threats are among the hardest attacks to detect because they come from people who already have legitimate access. Security…

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
25
Aug
2025

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux

Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them…

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies
25
Aug
2025

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. It’s…

Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day
24
Aug
2025

Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by…

China-linked Murky Panda targets and moves laterally through cloud services
22
Aug
2025

China-linked Murky Panda targets and moves laterally through cloud services

In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions….

Interpol operation seizes $97 million in African cybercrime sweep
22
Aug
2025

Interpol operation seizes $97 million in African cybercrime sweep

Authorities in Africa have arrested 1,209 people in an Interpol-led crackdown on cybercrime that targeted nearly 88,000 victims. 11,432 malicious…

AI gives ransomware gangs a deadly upgrade
22
Aug
2025

AI gives ransomware gangs a deadly upgrade

Ransomware continues to be the major threat to large and medium-sized businesses, with numerous ransomware gangs abusing AI for automation,…

The new battleground for CISOs is human behavior
22
Aug
2025

The new battleground for CISOs is human behavior

Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes…