Category: HelpnetSecurity

The legal blind spot of shadow IT
22
Apr
2025

The legal blind spot of shadow IT

Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance…

Email security, simplified: How PowerDMARC makes DMARC easy
22
Apr
2025

Email security, simplified: How PowerDMARC makes DMARC easy

Email is still the top way attackers get into organizations. Now, big players like Google, Yahoo, and Microsoft are cracking…

The C-suite gap that's putting your company at risk
22
Apr
2025

The C-suite gap that’s putting your company at risk

New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on…

Compliance weighs heavily on security and GRC teams
22
Apr
2025

Compliance weighs heavily on security and GRC teams

Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report…

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)
21
Apr
2025

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)

Oracle has released version 8 of its Unbreakable Enterprise Kernel (UEK), a custom Linux kernel built for Oracle Linux. UEK…

Why CISOs are watching the GenAI supply chain shift closely
21
Apr
2025

Why CISOs are watching the GenAI supply chain shift closely

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders…

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
21
Apr
2025

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line…

Cybercriminals blend AI and social engineering to bypass detection
21
Apr
2025

Cybercriminals blend AI and social engineering to bypass detection

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also…

Cyber threats now a daily reality for one in three businesses
21
Apr
2025

Cyber threats now a daily reality for one in three businesses

Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory…

Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed
20
Apr
2025

Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple plugs zero-day holes used…

The Zoom attack you didn't see coming
18
Apr
2025

The Zoom attack you didn’t see coming

Did you know that when participating in a Zoom call, you can grant permission to other participants to control your…

Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
18
Apr
2025

Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)

CVE-2021-20035, an old vulnerability affecting Sonicwall Secure Mobile Access (SMA) 100 series appliances, is being exploited by attackers. Sonicwall confirmed…