Category: HelpnetSecurity

Product showcase: Apricorn Aegis NVX, a high-security, portable SSD
13
Aug
2025

Product showcase: Apricorn Aegis NVX, a high-security, portable SSD

The Apricorn Aegis NVX is a hardware-based 256-Bit AES XTS external SSD drive with integrated USB-C cable. Its storage capacities…

AWS CISO explains how cloud-native security scales with your business
13
Aug
2025

AWS CISO explains how cloud-native security scales with your business

In this Help Net Security interview, Amy Herzog, CISO at AWS, discusses how cloud-native security enables scalable, flexible protection that…

CISOs face a complex tangle of tools, threats, and AI uncertainty
13
Aug
2025

CISOs face a complex tangle of tools, threats, and AI uncertainty

Most organizations are juggling too many tools, struggling with security blind spots, and rushing into AI adoption without governance, according…

Global OT cyber risk could top $329 billion, new report warns
13
Aug
2025

Global OT cyber risk could top $329 billion, new report warns

A new study from Dragos and Marsh McLennan puts hard numbers on the global financial risk tied to OT cyber…

Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)
12
Aug
2025

Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)

FortiGuard Labs has reported a dramatic spike in exploitation attempts targeting Citrix Bleed 2, a critical buffer over‑read flaw (CVE‑2025‑5777) affecting Citrix…

Rubrik Agent Rewind enables organizations to undo mistakes made by agentic AI
12
Aug
2025

Rubrik Agent Rewind enables organizations to undo mistakes made by agentic AI

Rubrik launched Agent Rewind, following the close of Rubrik’s acquisition of Predibase. Agent Rewind, powered by Predibase AI infrastructure, will…

WinRAR zero-day was exploited by two threat actors (CVE-2025-8088)
12
Aug
2025

WinRAR zero-day was exploited by two threat actors (CVE-2025-8088)

The RomCom attackers aren’t the only ones that have been leveraging the newly unveiled WinRAR vulnerability (CVE-2025-8088) in zero-day attacks:…

APT groups are getting personal, and CISOs should be concerned
12
Aug
2025

APT groups are getting personal, and CISOs should be concerned

Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home…

Cybersecurity jobs available right now: August 12, 2025
12
Aug
2025

Cybersecurity jobs available right now: August 12, 2025

Cloud Platforms Engineering Manager Mozn | UAE | Remote – View job details As a Cloud Platforms Engineering Manager, you…

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
12
Aug
2025

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations

EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues….

Why DNS threats should be on every CISO's radar in 2025
12
Aug
2025

Why DNS threats should be on every CISO’s radar in 2025

DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox,…

Win-DDoS: Attackers can turn public domain controllers into DDoS agents
11
Aug
2025

Win-DDoS: Attackers can turn public domain controllers into DDoS agents

SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain…