Category: HelpnetSecurity

New NIST guide explains how to detect morphed images
18
Aug
2025

New NIST guide explains how to detect morphed images

Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks…

Noodlophile infostealer is hiding behind fake copyright and PI infringement notices
18
Aug
2025

Noodlophile infostealer is hiding behind fake copyright and PI infringement notices

Attackers pushing the Noodlophile infostealer are targeting businesses with spear-phishing emails threatening legal action due to copyright or intellectual property…

Review: Data Engineering for Cybersecurity
18
Aug
2025

Review: Data Engineering for Cybersecurity

Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the…

How security teams are putting AI to work right now
18
Aug
2025

How security teams are putting AI to work right now

AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert…

Buttercup: Open-source AI-driven system detects and patches vulnerabilities
18
Aug
2025

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits,…

Weak alerting and slipping prevention raise risk levels for CISOs
18
Aug
2025

Weak alerting and slipping prevention raise risk levels for CISOs

Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft…

Bridging the AI model governance gap: Key findings for CISOs
18
Aug
2025

Bridging the AI model governance gap: Key findings for CISOs

While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could…

Week in review: 2 threat actors exploiting WinRAR 0-day, Microsoft fixes “BadSuccessor” Kerberos flaw
17
Aug
2025

Week in review: 2 threat actors exploiting WinRAR 0-day, Microsoft fixes “BadSuccessor” Kerberos flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: WinRAR zero-day was exploited by…

How military leadership prepares veterans for cybersecurity success
15
Aug
2025

How military leadership prepares veterans for cybersecurity success

In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how…

Cyber insurance market shows early signs of maturity
15
Aug
2025

Cyber insurance market shows early signs of maturity

The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent…

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers
15
Aug
2025

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers

Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model…

Employees race to build custom AI apps despite security risks
15
Aug
2025

Employees race to build custom AI apps despite security risks

The latest Netskope findings show a 50% increase in GenAI platform usage among enterprise end-users, driven by growing employee demand…