Category: HelpnetSecurity

New infosec products of the week: April 18, 2025
18
Apr
2025

New infosec products of the week: April 18, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Cyware, Entrust, PlexTrac,…

Securing digital products under the Cyber Resilience Act
18
Apr
2025

Securing digital products under the Cyber Resilience Act

In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means…

When ransomware strikes, what’s your move?
18
Apr
2025

When ransomware strikes, what’s your move?

Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the…

Widely available AI tools signal new era of malicious bot activity
18
Apr
2025

Widely available AI tools signal new era of malicious bot activity

Rise in accessible AI tools significantly lowered the barrier to entry for cyber attackers, enabling them to create and deploy…

SafeLine Bot Management: Self-hosted alternative to Cloudflare
17
Apr
2025

SafeLine Bot Management: Self-hosted alternative to Cloudflare

Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While…

Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)
17
Apr
2025

Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)

CVE-2025-24054, a Windows NTLM hash disclosure vulnerability that Microsoft has issued patches for last month, has been leveraged by threat…

Apple plugs zero-days holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)
17
Apr
2025

Apple plugs zero-days holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)

Apple has released emergency security updates for iOS/iPadOS, macOS, tvOS and visionOS that fix two zero-day vulnerabilities (CVE-2025-31200, CVE-2025-31201) that…

Microsoft vulnerabilities: What's improved, what's at risk
17
Apr
2025

Microsoft vulnerabilities: What’s improved, what’s at risk

Microsoft reported a record 1,360 vulnerabilities in 2024, according to the latest BeyondTrust Microsoft Vulnerabilities Report. The volume marks an…

When AI agents go rogue, the fallout hits the enterprise
17
Apr
2025

When AI agents go rogue, the fallout hits the enterprise

In this Help Net Security interview, Jason Lord, CTO at AutoRABIT, discusses the cybersecurity risks posed by AI agents integrated…

Review: Hands-On Industrial Internet of Things
17
Apr
2025

Review: Hands-On Industrial Internet of Things

Hands-On Industrial Internet of Things is a practical guide designed specifically for professionals building and securing industrial IoT (IIoT) systems….

Entrust Cryptographic Security Platform provides visibility into cryptographic risk posture
16
Apr
2025

Entrust Cryptographic Security Platform provides visibility into cryptographic risk posture

Entrust announced the Entrust Cryptographic Security Platform, a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. Cyberattacks…

Cozy Bear targets EU diplomats with wine-tasting invites (again)
16
Apr
2025

Cozy Bear targets EU diplomats with wine-tasting invites (again)

APT29 (aka Cozy Bear, aka Midnight Blizzard) is, once again, targeting European diplomats with fake invitations to wine-tasting events, Check…