Category: HelpnetSecurity

What good threat intelligence looks like in practice
21
May
2025

What good threat intelligence looks like in practice

In this Help Net Security interview, Anuj Goel, CEO of Cyware, discusses how threat intelligence is no longer a nice…

AutoPatchBench: Meta's new way to test AI bug fixing tools
21
May
2025

AutoPatchBench: Meta’s new way to test AI bug fixing tools

AutoPatchBench is a new benchmark that tests how well AI tools can fix code bugs. It focuses on C and…

Nation-state APTs ramp up attacks on Ukraine and the EU
21
May
2025

Nation-state APTs ramp up attacks on Ukraine and the EU

Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine…

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
20
May
2025

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2

To meet today’s complex security requirements, organizations need solutions that are not only secure, but also practical and scalable. The…

Outpost24 simplifies threat analysis with AI-enhanced summaries
20
May
2025

Outpost24 simplifies threat analysis with AI-enhanced summaries

Outpost24 announced the addition of AI-enhanced summaries to the Digital Risk Protection (DRP) modules within its External Attack Surface Management…

Trojanized KeePass opens doors for ransomware attackers
20
May
2025

Trojanized KeePass opens doors for ransomware attackers

A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage…

The Windows Subsystem for Linux goes open source
20
May
2025

The Windows Subsystem for Linux goes open source

Microsoft has officially open-sourced the Windows Subsystem for Linux (WSL), closing the very first issue ever filed on the Microsoft/WSL…

Cybersecurity jobs available right now: May 20, 2025
20
May
2025

Cybersecurity jobs available right now: May 20, 2025

CISO Vault Cloud | Australia | Hybrid – View job details As a CISO, you will lead company’s cloud security…

Closing security gaps in multi-cloud and SaaS environments
20
May
2025

Closing security gaps in multi-cloud and SaaS environments

In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research…

Why legal must lead on AI governance before it's too late
20
May
2025

Why legal must lead on AI governance before it’s too late

In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the…

AI voice hijacking: How well can you trust your ears?
20
May
2025

AI voice hijacking: How well can you trust your ears?

How sure are you that you can recognize an AI-cloned voice? If you think you’re completely certain, you might be…

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
19
May
2025

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360….