Category: HelpnetSecurity

WinRAR zero day exploited by RomCom hackers in targeted attacks
11
Aug
2025

WinRAR zero day exploited by RomCom hackers in targeted attacks

ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you…

Breaches are up, budgets are too, so why isn't healthcare safer?
11
Aug
2025

Breaches are up, budgets are too, so why isn’t healthcare safer?

A new report from Resilience outlines a growing cyber crisis in the U.S. healthcare sector, where ransomware attacks, vendor compromise,…

Review: From Day Zero to Zero Day
11
Aug
2025

Review: From Day Zero to Zero Day

From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about…

Pentesting is now central to CISO strategy
11
Aug
2025

Pentesting is now central to CISO strategy

Security leaders are rethinking their approach to cybersecurity as digital supply chains expand and generative AI becomes embedded in critical…

Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025
10
Aug
2025

Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Black Hat USA 2025Black Hat…

August 2025 Patch Tuesday forecast: Try, try, again
08
Aug
2025

August 2025 Patch Tuesday forecast: Try, try, again

July turned into a surprisingly busy month. It started slowly with a fairly ‘calm’ Patch Tuesday as I forecasted in…

Fraud controls don’t guarantee consumer trust
08
Aug
2025

Fraud controls don’t guarantee consumer trust

Over a third of companies say they are using AI, including generative AI, to fight fraud, according to Experian. As…

From fake CAPTCHAs to RATs: Inside 2025's cyber deception threat trends
08
Aug
2025

From fake CAPTCHAs to RATs: Inside 2025’s cyber deception threat trends

Cybercriminals are getting better at lying. That’s the takeaway from a new LevelBlue report, which outlines how attackers are using…

New infosec products of the week: August 8, 2025
08
Aug
2025

New infosec products of the week: August 8, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Descope, Elastic, ExtraHop,…

What GPT‑5 means for IT teams, devs, and the future of AI at work
07
Aug
2025

What GPT‑5 means for IT teams, devs, and the future of AI at work

OpenAI has released GPT‑5, the newest version of its large language model. It’s now available to developers and ChatGPT users,…

Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)
07
Aug
2025

Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate…

SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls
07
Aug
2025

SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls

Akira ransomware affiliates are not leveraging an unknown, zero-day vulnerability in SonicWall Gen 7 firewalls to breach corporate networks, the…