Category: HelpnetSecurity

What CISOs need to know about agentic AI
13
Jun
2025

What CISOs need to know about agentic AI

GenAI has been the star of the show lately. Tools like ChatGPT impressed everyone with how well they can summarize,…

Unpacking the security complexity of no-code development platforms
13
Jun
2025

Unpacking the security complexity of no-code development platforms

In this Help Net Security interview, Amichai Shulman, CTO at Nokod Security, discusses how the abstraction layer in no-code environments…

Security flaws in government apps go unpatched for years
13
Jun
2025

Security flaws in government apps go unpatched for years

78% of public sector organizations are operating with significant security debt, flaws left unaddressed for more than a year, according…

19 ways to build zero trust: NIST offers practical implementation guide
13
Jun
2025

19 ways to build zero trust: NIST offers practical implementation guide

The National Institute of Standards and Technology (NIST) has released a new guide that offers practical help for building zero…

Researchers warn of ongoing Entra ID account takeover campaign
12
Jun
2025

Researchers warn of ongoing Entra ID account takeover campaign

Attackers are using the TeamFiltration pentesting framework to brute-force their way into Microsoft Entra ID (formerly Azure AD) accounts, Proofpoint…

LockBit panel data leak shows Chinese orgs among the most targeted
12
Jun
2025

LockBit panel data leak shows Chinese orgs among the most targeted

The LockBit ransomware-as-a-service (RaaS) operation has netted around $2.3 million USD within 5 months, the data leak stemming from the…

Identifying high-risk APIs across thousands of code repositories
12
Jun
2025

Identifying high-risk APIs across thousands of code repositories

In this Help Net Security interview, Joni Klippert, CEO of StackHawk, discusses why API visibility is a major blind spot…

Lemony mitigates privacy and compliance risks associated with cloud-based AI
12
Jun
2025

Lemony mitigates privacy and compliance risks associated with cloud-based AI

Lemony announced its on-premise artificial intelligence solution that is redefining how organizations deploy generative AI. Lemony’s secure, hardware-based node offers…

Build a mobile hacking rig with a Pixel and Kali NetHunter
12
Jun
2025

Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3…

Cybercriminals are turning stolen data into a thriving black market
12
Jun
2025

Cybercriminals are turning stolen data into a thriving black market

Cybercriminals are stealing data and running full-scale businesses around it. Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) report reveals…

Want fewer security fires to fight? Start with threat modeling
12
Jun
2025

Want fewer security fires to fight? Start with threat modeling

CISOs understand that threat modeling helps teams identify risks early and build safer systems. But outside the security org, the…

CISOs call for operational threat intelligence integration
12
Jun
2025

CISOs call for operational threat intelligence integration

98% of CISOs face challenges when using threat intelligence, according to Trellix. The biggest problems are keeping up with changing…