The fall of two of the most dominant ransomware syndicates, LockBit and AlphV, triggered a power vacuum across the cybercriminal landscape, acccording to a Black Kite survey. In their place, dozens of new actors emerged, many of them lacking the…
Tag: Help Net Security
Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
On May 2025 Patch Tuesday, Microsoft has released security fixes for 70+ vulnerabilities, among them five actively exploited zero-days and two publicly disclosed (but not exploited) vulnerabilities. The zero-days and the publicly disclosed flaws Among the zero-days patched is a…
Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
Fortinet has patched a critical vulnerability (CVE-2025-32756) that has been exploited in the wild to compromise FortiVoice phone / conferencing systems, the company’s product security incident response team has revealed on Tuesday. About CVE-2025-32756 CVE-2025-32756 is a stack-based overflow vulnerability…
Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a “very limited” number of customers, Ivanti has confirmed on Tuesday, and urged customers to install a patch as soon as possible. “The…
Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources
Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks. The new offering is part of Lenovo ThinkShield’s portfolio of enterprise-grade cybersecurity solutions. Cybercriminals…
Tufin TOS Discovery automates device discovery and onboarding
Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date. Maintaining up-to-date network topology is a crucial task – one that enables proper enforcement of security policies…
Product showcase: Go beyond VPNs and Tor with NymVPN
If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs require you to trust a single company with your internet activity. Even if they promise “no logs,” you’re still handing…
DefectDojo boosts unified vulnerability management
DefectDojo launched risk-based prioritization capabilities for DefectDojo Pro. This new feature enables application and infrastructure security teams to prioritize vulnerabilities based on real-world risk—not just severity scores—using a range of factors including exploitability, reachability, revenue impact, potential compliance penalties, user…
CISOs must speak business to earn executive trust
In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, communicate risk in business terms, and use automation to support business goals. What…
AI vs AI: How cybersecurity pros can use criminals’ tools against them
For a while now, AI has played a part in cybersecurity. Now, agentic AI is taking center stage. Based on pre-programmed plans and objectives, agentic AI can make choices which optimize results without a need for developer intervention. As agentic…
Breaking down silos in cybersecurity
All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply…
Review: Resilient Cybersecurity
Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience…
Cybersecurity jobs available right now: May 13, 2025
The post Cybersecurity jobs available right now: May 13, 2025 appeared first on Help Net Security. This article has been indexed from Help Net Security Read the original article: Cybersecurity jobs available right now: May 13, 2025
UNIDIR Intrusion Path: New framework to analyze ICT environment activities
Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because technical explanations are too complex or because media coverage oversimplifies the issues. To help understand and analyze these activities, UNIDIR…
Law enforcement takes down proxy botnets used by criminals
US and Dutch law enforcement, with the help of Lumen researchers, have disrupted 5socks and Anyproxy, two proxy-for-rent services that were used by criminals for ad fraud and DDoS and brute-force attacks (among other things). The domain seizure notice The…
Hunted Labs Entercept combats software supply chain attacks
Hunted Labs announced Entercept, an AI-powered source code security platform that gives enterprises instant visibility into suspicious behavior from the people and code in their software supply chain. Open source code and the people who write it are the unguarded…
Compromised SAP NetWeaver instances are ushering in opportunistic threat actors
A second wave of attacks against the hundreds of SAP NetWeaver platforms compromised via CVE-2025-31324 is underway. “[The] attacks [are] staged by follow-on, opportunistic threat actors who are leveraging previously established webshells (from the first zero-day attack) on vulnerable systems,”…
Resecurity One simplifies cybersecurity operations
Resecurity launched Resecurity One, the next-generation cybersecurity platform designed to improve how organizations approach cybersecurity. Resecurity One combines Digital Risk Management, Cyber Threat Intelligence, Endpoint Protection, Identity Protection, Supply Chain Risk Monitoring, and xDR capabilities into a unified solution, providing…
Bluetooth 6.1 released, enhances privacy and power efficiency
The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update to how devices manage privacy and power. The update, called Bluetooth Randomized RPA (resolvable private address) Updates, helps protect users…
How to give better cybersecurity presentations (without sounding like a robot)
Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or presenting, can be developed only if you…