Category: EN

Exposed training apps are showing up in active cloud attacks

Security teams often spin up vulnerable applications for demos, training, or internal testing. A recent Pentera research report documents how those environments are being left exposed on the public internet and actively exploited. The research focuses on intentionally vulnerable apps…

Unbounded AI use can break your systems

In this Help Net Security video, James Wickett, CEO of DryRun Security, explains cyber risks many teams underestimate as they add AI to products. He focuses on how fast LLM features are pushed into live applications without limits or guardrails.…

NSFOCUS AI-Scan Gains Recognition from Authoritative Institution

SANTA CLARA, Calif., Jan 22, 2026 – Recently, International Data Corporation (IDC) released the report “China Large Language Model (LLM) Security Assessment Platform Vendor Technology Evaluation” (Doc#CHC53839325, October 2025). NSFOCUS was selected for this report based on its proven product performance…

macOS Tahoe improves privacy and communication safety

macOS Tahoe privacy and security features focus on screening unwanted contact, limiting tracking, and keeping more decisions on the device. Most updates run quietly in the background and require little setup. Built-in filtering for calls and messages Apple reduced exposure…

Top 8 cybersecurity predictions for 2026

<p>Look into our cybersecurity crystal ball for the rest of 2026, and you probably won’t be surprised to see a familiar acronym appear: AI.</p> <p>What’s new this year is that — three years after ChatGPT first burst into public consciousness…

What innovative practices secure AI-driven architectures?

How Do Non-Human Identities Strengthen AI Security Architectures? Is your organization fully prepared to handle the intricate demands of AI-driven systems? Non-Human Identities (NHIs) play a crucial role in securing AI architectures. By effectively managing these machine identities, organizations can…

Can AI manage cloud security effectively?

How Can AI Revolutionize Cloud Security Management? How do organizations ensure that their cloud environments are not just secure but intelligently managed? The answer lies in understanding the potential of AI in cloud security. With machines become predominant players in…

What makes NHIs safe for my company?

How Secure Are Non-Human Identities in Your Company’s Digital Strategy? Have you ever considered who—or rather, what—is accessing your company’s data? While we often focus on human users in cybersecurity strategies, non-human identities (NHIs) play a pivotal role in security…

How powerful is agentic AI in detecting threats?

Is Agentic AI the Key to Revolutionizing Threat Detection in Cybersecurity? Where organizations increasingly migrate to cloud environments, the complexity of safeguarding data intensifies. Cybersecurity is no longer just about protecting networks from human attackers but also about managing machine…