Category: HelpnetSecurity

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
13
May
2025

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)

Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a “very limited”…

Product showcase: Go beyond VPNs and Tor with NymVPN
13
May
2025

Product showcase: Go beyond VPNs and Tor with NymVPN

If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs…

Cybersecurity jobs available right now: May 13, 2025
13
May
2025

Cybersecurity jobs available right now: May 13, 2025

AVP, Vulnerability Management Engineer LPL Financial | USA | Hybrid – View job details As an AVP, Vulnerability Management Engineer,…

CISOs must speak business to earn executive trust
13
May
2025

CISOs must speak business to earn executive trust

In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of…

Review: Resilient Cybersecurity - Help Net Security
13
May
2025

Review: Resilient Cybersecurity – Help Net Security

Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk…

Breaking down silos in cybersecurity
13
May
2025

Breaking down silos in cybersecurity

All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices,…

UNIDIR Intrusion Path: New framework to analyze ICT environment activities
13
May
2025

UNIDIR Intrusion Path: New framework to analyze ICT environment activities

Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because…

Law enforcement takes down proxy botnets used by criminals
12
May
2025

Law enforcement takes down proxy botnets used by criminals

US and Dutch law enforcement, with the help of Lumen researchers, have disrupted 5socks and Anyproxy, two proxy-for-rent services that…

Hunted Labs Entercept combats software supply chain attacks
12
May
2025

Hunted Labs Entercept combats software supply chain attacks

Hunted Labs announced Entercept, an AI-powered source code security platform that gives enterprises instant visibility into suspicious behavior from the…

Compromised SAP NetWeaver instances are ushering in opportunistic threat actors
12
May
2025

Compromised SAP NetWeaver instances are ushering in opportunistic threat actors

A second wave of attacks against the hundreds of SAP NetWeaver platforms compromised via CVE-2025-31324 is underway. “[The] attacks [are]…

Bluetooth 6.1 released, enhances privacy and power efficiency
12
May
2025

Bluetooth 6.1 released, enhances privacy and power efficiency

The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update…

Why security teams cannot rely solely on AI guardrails
12
May
2025

Why security teams cannot rely solely on AI guardrails

In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails…