Category: HelpnetSecurity

New infosec products of the week: June 20, 2025
20
Jun
2025

New infosec products of the week: June 20, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Dashlane, Sumsub, and Jumio….

Thieves don't need your car keys, just a wireless signal
19
Jun
2025

Thieves don’t need your car keys, just a wireless signal

A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote…

Why AI code assistants need a security reality check
19
Jun
2025

Why AI code assistants need a security reality check

In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants…

GPS tracker detection made easy with off-the-shelf hardware
19
Jun
2025

GPS tracker detection made easy with off-the-shelf hardware

Cyberstalkers are increasingly turning to cheap GPS trackers to secretly monitor people in real time. These devices, which often cost…

91% noise: A look at what's wrong with traditional SAST tools
19
Jun
2025

91% noise: A look at what’s wrong with traditional SAST tools

Traditional static application security testing (SAST) tools are falling short. That’s the key takeaway from a recent report that tested…

How C-suite roles are shaping the future of tech leadership
19
Jun
2025

How C-suite roles are shaping the future of tech leadership

As companies accelerate towards technology-driven business models, the tech C-suite is embracing new skills, greater influence, and a unified approach…

AWS launches new cloud security features
18
Jun
2025

AWS launches new cloud security features

Amazon Web Services has announced new and improved security features at its annual AWS re:Inforce cloud security conference. The company…

Jumio Liveness Premium combats deepfakes and injection attacks
18
Jun
2025

Jumio Liveness Premium combats deepfakes and injection attacks

Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company’s most advanced biometric liveness detection solution to date. Jumio’s…

Chaining two LPEs to get "root": Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
18
Jun
2025

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)

Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CVE-2025-6019) that can be exploited in tandem to achieve root…

AI is changing cybersecurity roles, and entry-level jobs are at risk
18
Jun
2025

AI is changing cybersecurity roles, and entry-level jobs are at risk

Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging…

Dashlane’s AI model alerts businesses to phishing risks
18
Jun
2025

Dashlane’s AI model alerts businesses to phishing risks

Dashlane introduced AI phishing alerts, an advancement to the Dashlane Omnix platform that protects enterprises and users against threats targeting…

Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
18
Jun
2025

Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security

As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF,…