Category: HelpnetSecurity

Closing security gaps in multi-cloud and SaaS environments
20
May
2025

Closing security gaps in multi-cloud and SaaS environments

In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research…

Why legal must lead on AI governance before it's too late
20
May
2025

Why legal must lead on AI governance before it’s too late

In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the…

AI voice hijacking: How well can you trust your ears?
20
May
2025

AI voice hijacking: How well can you trust your ears?

How sure are you that you can recognize an AI-cloned voice? If you think you’re completely certain, you might be…

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
19
May
2025

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360….

ThreatMark offers protection against social engineering attacks and scams
19
May
2025

ThreatMark offers protection against social engineering attacks and scams

ThreatMark launched ScamFlag, a Generative AI-powered solution designed to protect digital banks and their customers from the scams and social…

Malicious RVTools installer found on official site, researcher warns
19
May
2025

Malicious RVTools installer found on official site, researcher warns

The official site for RVTools has apparently been hacked to serve a compromised installer for the popular utility, a security…

Why EU encryption policy needs technical and civil society input
19
May
2025

Why EU encryption policy needs technical and civil society input

In this Help Net Security interview, Full Professor at University of Leuven, unpacks the European Commission’s encryption agenda, urging a…

AI hallucinations and their risk to cybersecurity operations
19
May
2025

AI hallucinations and their risk to cybersecurity operations

AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors can range…

Hanko: Open-source authentication and user management
19
May
2025

Hanko: Open-source authentication and user management

Hanko is an open-source, API-first authentication solution purpose-built for the passwordless era. “We focus on helping developers and organizations modernize…

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited
18
May
2025

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patch Tuesday: Microsoft fixes 5…

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
16
May
2025

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)

A high-severity Chrome vulnerability (CVE-2025-4664) that Google has fixed on Wednesday is being leveraged by attackers, CISA has confirmed by…

New infosec products of the week: May 16, 2025
16
May
2025

New infosec products of the week: May 16, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Hunted Labs, McAfee, Obsidian Security,…