Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)

Attackers are exploiting a recently revealed vulnerability (CVE-2025-59718) to bypass authentication on Fortinet’s FortiGate firewalls, and are leveraging the achieved access to export their system configuration files, Arctic Wolf... Read more »

Trellix advances NDR to close the OT-IT threat detection-to-response gap

Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation and response to reduce the threat detection-to-response gap. “We... Read more »

XM Cyber bridges external attack surface management with validated internal attack paths

XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the gap between what’s exposed outside and what exists inside.... Read more »

Hadrian launches offensive agentic AI to expose vulnerabilities before attackers

Hadrian launched the latest iteration of its offensive Agentic AI Platform, designed to take an offensive approach to find external exposures and test them for exploitability. Instead of waiting... Read more »

Vectra AI redefines hybrid resilience across the attack lifecycle

Vectra AI redefines hybrid attack resilience across the full attack lifecycle by unifying controls pre-and-post compromise within the Vectra AI Platform. Vectra AI’s control philosophy empowers defenders with continuous... Read more »

Why vulnerability reports stall inside shared hosting companies

Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A new qualitative study digs into what happens after those... Read more »

Banks built rules for yesterday’s crime and RegTech is trying to fix that

Criminals are moving money across borders faster, and financial institutions are feeling the squeeze. Compliance teams feel this strain every day as they try to keep up with schemes... Read more »

Zabbix: Open-source IT and OT observability solution

Zabbix is an open source monitoring platform designed to track the availability, performance, and integrity of IT environments. It monitors networks along with servers, virtual machines, applications, services, databases,... Read more »

How exposure management changes cyber defense

In this Help Net Security video, Larry Slusser, VP of Strategy at SixMap, explains why endpoint detection and response is only part of the security story. Drawing on his... Read more »

AI breaks the old security playbook

AI has moved into enterprise operations faster than many security programs expected. It is embedded in workflows, physical systems, and core infrastructure. Some AI tools reach hundreds of millions... Read more »
Subscribe to our Newsletter