Category: HelpnetSecurity

Skyhawk Security enhances Autonomous Purple Team to secure custom cloud apps
23
Apr
2025

Skyhawk Security enhances Autonomous Purple Team to secure custom cloud apps

Skyhawk Security expanded its AI-powered Autonomous Purple Team to include custom cloud applications. For the first time, organizations can preemptively…

SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
23
Apr
2025

SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories

By connecting powerful language models like GPT-4o and Claude Sonnet 3.5 to real-world tools, the open-source tool SWE-agent allows them…

The dark side of YouTube: Malicious links, phishing, and deepfakes
23
Apr
2025

The dark side of YouTube: Malicious links, phishing, and deepfakes

With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and…

Phishing emails delivering infostealers surge 84%
23
Apr
2025

Phishing emails delivering infostealers surge 84%

Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to…

54% of tech hiring managers expect layoffs in 2025
22
Apr
2025

54% of tech hiring managers expect layoffs in 2025

54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say…

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
22
Apr
2025

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)

There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last…

Stellar Cyber boosts security operations with human-augmented Autonomous SOC
22
Apr
2025

Stellar Cyber boosts security operations with human-augmented Autonomous SOC

At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the…

What school IT admins are up against, and how to help them win
22
Apr
2025

What school IT admins are up against, and how to help them win

School IT admins are doing tough, important work under difficult conditions. From keeping Wi-Fi stable during exams to locking down…

The legal blind spot of shadow IT
22
Apr
2025

The legal blind spot of shadow IT

Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance…

Email security, simplified: How PowerDMARC makes DMARC easy
22
Apr
2025

Email security, simplified: How PowerDMARC makes DMARC easy

Email is still the top way attackers get into organizations. Now, big players like Google, Yahoo, and Microsoft are cracking…

The C-suite gap that's putting your company at risk
22
Apr
2025

The C-suite gap that’s putting your company at risk

New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on…

Compliance weighs heavily on security and GRC teams
22
Apr
2025

Compliance weighs heavily on security and GRC teams

Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report…