Censys announced the release of a new ICS/OT Internet intelligence offering designed to close the visibility gap defenders face when securing exposed industrial assets. From energy and manufacturing to defense and utilities, organizations across industries face growing risks as IT…
Category: Help Net Security
AISLE launches from stealth with AI-native cyber reasoning system to tackle zero-day vulnerabilities
AISLE emerged from stealth, delivering the AI-native cyber reasoning system (CRS) that autonomously identifies, triages and remediates with verification both known and zero-day application vulnerabilities, which still account for the majority of security breaches. Malicious actors continue to exploit a…
Inside healthcare’s quiet cybersecurity breakdown
Hospitals, clinics, and care networks continue to treat cybersecurity as a back-office issue, according to the 2025 Healthcare IT Landscape Report from Omega Systems. Security takes a back seat Healthcare IT leaders are juggling competing demands. Rising costs, new privacy…
A new approach to blockchain spam: Local reputation over global rules
Spam has long been a nuisance in blockchain networks, clogging transaction queues and driving up fees. A new research paper from Delft University of Technology introduces a decentralized solution called STARVESPAM that could help nodes in permissionless blockchains block spam…
SAP zero-day wake-up call: Why ERP systems need a unified defense
In this Help Net Security video, Paul Laudanski, Director of Research at Onapsis, discusses key lessons from the SAP zero-day vulnerability. He explains why business-critical systems like ERP and CRM remain top targets for attackers, since they hold valuable data…
Everyone’s adopting AI, few are managing the risk
AI is spreading across enterprise risk functions, but confidence in those systems remains uneven, according to AuditBoard. More than half of organizations report implementing AI-specific tools, and many are training teams in machine learning skills. Yet, few feel prepared for…
New infosec products of the week: October 17, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Aura, Bitsight, Blumira, Cayosoft, Corelight, Netcraft, and Picus Security. Picus Security uses AI to turn threat intelligence into attack simulations Picus Security launched new AI-powered…
“Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
CISA has added CVE-2025-54253, a misconfiguration vulnerability in Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), to its Known Exploited Vulnerabilities catalog, thus warning of detected in-the-wild exploitation. Adobe fixed the vulnerability in August 2025, along with CVE-2025-54254,…
Veeam launches Data Cloud for MSPs to simplify Microsoft 365 and Entra ID protection
Veeam Software announced the availability of Veeam Data Cloud (VDC) for Managed Service Providers (MSPs) through the Veeam Cloud & Service Provider (VCSP) program. Designed to empower third-party service providers, Veeam Data Cloud delivers secure, scalable, and resilient data protection…
Cayosoft Guardian Protector safeguards Microsoft 365 and hybrid identity systems
Cayosoft introduced Cayosoft Guardian Protector, a free, always-on solution that delivers real-time threat detection, proactive alerts, resolution guidance, and change history for complex Microsoft hybrid identity environments. Cayosoft Guardian Protector provides administrators and security teams with continuous, real-time visibility and…
When trusted AI connections turn hostile
Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers can quietly take control of hosts, manipulate LLM behavior, and deceive users, all while…
Identifying risky candidates: Practical steps for security leaders
Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can turn into costly problems down the line. Identity verification, credential validation,…
Everyone wants AI, but few are ready to defend it
The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI, many are not ready for the pressure it puts on their…
Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that can be hacked through Bluetooth Their tests show that anyone…
The password problem we keep pretending to fix
Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had faced at least one identity-related breach in recent years, and most…
ImmuniWeb Expands discovery with ASM and Dark web packages
On top of several new free tools launched during the summer, ImmuniWeb released over 500 updates, improvements, new features, and integrations across all our products in Q3, including ImmuniWeb On-Demand, ImmuniWeb MobileSuite, ImmuniWeb Continuous, ImmuniWeb Neuron, ImmuniWeb Neuron Mobile, and…
F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information related to its BIG-IP family of networking and security products, the company confirmed today. BIG-IP vulnerabilities are often leveraged by…
Blumira rolls out SOC Auto-Focus to streamline threat investigation
Blumira launched SOC Auto-Focus, an AI-powered security investigation tool, alongside enhancements to its Managed Service Provider (MSP) partner program. SOC Auto-Focus is designed to help IT teams and MSPs work smarter, reduce alert fatigue and accelerate incident response through contextual…
Harmonic Security targets AI data risks with Model Context Protocol Gateway
Harmonic Security announced Model Context Protocol (MCP) Gateway, a developer-friendly, locally installed gateway that gives security teams complete visibility and control over their organization’s agentic AI ecosystem. The solution intercepts all MCP traffic enabling security teams to discover what clients…
Microsoft patches three zero-days actively exploited by attackers
On October 2025 Patch Tuesday, Microsoft released fixes for 175+ vulnerabilities, including three zero-days under active attack: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827. The actively exploited vulnerabilities are an unusual mix CVE-2025-24990 is in the third-party driver (ltmdm64.sys) for the software-based Agere…