Category: HelpnetSecurity

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)
20
Aug
2025

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)

A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has…

iOS security features you should use to protect your privacy
20
Aug
2025

iOS security features you should use to protect your privacy

iOS 18 comes with several privacy and security features that many iPhone users overlook. Knowing how to use them can…

LudusHound: Open-source tool brings BloodHound data to life
20
Aug
2025

LudusHound: Open-source tool brings BloodHound data to life

LudusHound is an open-source tool that takes BloodHound data and uses it to set up a working Ludus Range for…

The AI security crisis no one is preparing for
20
Aug
2025

The AI security crisis no one is preparing for

In this Help Net Security interview, Jacob Ideskog, CTO of Curity, discusses the risks AI agents pose to organizations. As…

Why CISOs in business services must close the edge security gap
20
Aug
2025

Why CISOs in business services must close the edge security gap

Cloud adoption is speeding ahead in the business services sector, but security for remote and edge environments is falling behind….

Google unveils new AI and cloud security capabilities at Security Summit
19
Aug
2025

Google unveils new AI and cloud security capabilities at Security Summit

Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation…

Webinar: Why AI and SaaS are now the same attack surface
19
Aug
2025

Webinar: Why AI and SaaS are now the same attack surface

The lines between SaaS and AI are vanishing. AI agents are now first-class citizens in your SaaS universe: accessing sensitive…

Android VPN apps used by millions are covertly connected AND insecure
19
Aug
2025

Android VPN apps used by millions are covertly connected AND insecure

Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a…

What happens when penetration testing goes virtual and gets an AI coach
19
Aug
2025

What happens when penetration testing goes virtual and gets an AI coach

Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to…

Git 2.51: Preparing for the future with SHA-256
19
Aug
2025

Git 2.51: Preparing for the future with SHA-256

Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes…

The cybersecurity myths companies can’t seem to shake
19
Aug
2025

The cybersecurity myths companies can’t seem to shake

Cybersecurity myths are like digital weeds: pull one out, and another quickly sprouts in its place. You’ve probably heard them…

Cybersecurity jobs available right now: August 19, 2025
19
Aug
2025

Cybersecurity jobs available right now: August 19, 2025

Senior Cybersecurity Analyst DOT Security | USA | On-site – View job details As a Senior Cybersecurity Analyst, you will…