Category: HelpnetSecurity

Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched
29
Jun
2025

Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Stealthy backdoor found hiding in…

Money mule networks evolve into hierarchical, business-like criminal enterprises
27
Jun
2025

Money mule networks evolve into hierarchical, business-like criminal enterprises

In this Help Net Security interview, Michal Tresner, CEO of ThreatMark, discusses how cybercriminals are weaponizing AI, automation, and social…

We know GenAI is risky, so why aren't we fixing its flaws?
27
Jun
2025

We know GenAI is risky, so why aren’t we fixing its flaws?

Even though GenAI threats are a top concern for both security teams and leadership, the current level of testing and…

After a hack many firms still say nothing, and that’s a problem
27
Jun
2025

After a hack many firms still say nothing, and that’s a problem

Attackers are more inclined to “log in rather than break in,” using stolen credentials, legitimate tools, and native access to…

Infosec products of the month: June 2025
27
Jun
2025

Infosec products of the month: June 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, AttackIQ, Barracuda Networks, BigID,…

Embed's agentic security platform triages and investigates security alerts
26
Jun
2025

Embed’s agentic security platform triages and investigates security alerts

Embed Security unveiled its agentic security platform that autonomously triages and investigates alerts, empowering detection and response teams to focus…

ClickFix attacks skyrocketing more than 500%
26
Jun
2025

ClickFix attacks skyrocketing more than 500%

ClickFix, a deceptive attack method, saw a surge of more than 500% in the first half of 2025, making it…

CC Signals lets you set boundaries with AI without locking down your work
26
Jun
2025

CC Signals lets you set boundaries with AI without locking down your work

Creative Commons introduced CC Signals, a new framework that helps data and content owners communicate how they want their work…

Bitdefender GravityZone EASM reduces threat exposure
26
Jun
2025

Bitdefender GravityZone EASM reduces threat exposure

Bitdefender announced Bitdefender GravityZone External Attack Surface Management (EASM), a new solution that gives businesses, managed service providers (MSPs) and…

Google's Gemini CLI brings open-source AI agents to developers
26
Jun
2025

Google’s Gemini CLI brings open-source AI agents to developers

Google has open-sourced a command-line interface (CLI) agent built on its Gemini 1.5 Pro model, marking a notable step toward…

Building cyber resilience in always-on industrial environments
26
Jun
2025

Building cyber resilience in always-on industrial environments

In this Help Net Security interview, Dr. Tim Sattler, CISO at Jungheinrich, discusses the cybersecurity risks tied to smart warehouses…

When synthetic identity fraud looks just like a good customer
26
Jun
2025

When synthetic identity fraud looks just like a good customer

People may assume synthetic identity fraud has no victims. They believe fake identities don’t belong to real people, so no…