Google has disrupted Ipidea, a massive residential proxy network consisting of user devices that are being used as the last-mile link in cyberattack chains. “In a single seven day period in January 2026, GTIG observed over 550 individual threat groups…
Category: Help Net Security
eScan AV supply chain compromise: Users targeted with malicious updates
The update infrastructure for eScan antivirus, a product of Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer endpoints. The supply chain compromise also resulted in the eScan antivirus…
Virtue AI AgentSuite enables enterprises to test and secure AI agents
Virtue AI announced AgentSuite, a multi-layer security and compliance platform for enterprise AI agents. Organizations worldwide are deploying agents that modify databases, trigger payments, and access systems containing sensitive information. AgentSuite is the AI-native platform built specifically for this new…
France Travail fined €5 million for failing to protect job seeker data
France data protection authority CNIL has fined public employment agency France Travail €5 million for failing to ensure the security of personal data of job seekers. Attackers gained access to the organization’s systems through social engineering techniques that targeted accounts…
Druva Threat Watch offers continuous threat monitoring of backup data
Druva announced the launch of Threat Watch, a zero-touch, automated cloud-native solution for proactive threat monitoring of backup data. Threat Watch is designed to continuously scan backup snapshots to identify dormant threats and indicators of compromise (IOCs), empowering IT and…
N-able brings AI to endpoint, security, and recovery
N-able announced enhanced AI capabilities across its platform to help organizations operate securely, efficiently, and resiliently as AI reshapes both cyberthreats and IT complexity. As AI accelerates the speed, scale, and sophistication of cyberattacks, businesses are struggling to defend themselves.…
Conditional Access enforcement change coming to Microsoft Entra
Microsoft will change how Conditional Access policies are enforced in Microsoft Entra starting March 27, 2026, with a phased rollout continuing through June 2026. The change affects sign-ins through client applications that request only OIDC scopes or a limited set…
cside VPN Detection enables control of VPN traffic to prevent fraud and legal exposure
cside announced the launch of VPN Detection. The new solution enables businesses to detect and manage traffic originating from virtual private networks. As verification laws and content distribution agreements tighten, cside VPN Detection helps address compliance requirements while protecting organizations…
Sumsub’s AI Agent Verification binds automation to verified human identity
Sumsub announced the launch of its AI Agent Verification solution, an approach to controlling AI-driven automation by binding it to a real, verified human identity within Sumsub’s Know Your Agent (KYA) framework. As AI agents and browser-based automation grow in…
Tosi Platform delivers unified connectivity, visibility, and security for OT at scale
Tosi customers worldwide gain access to the Tosi Platform, which unifies connectivity, visibility, and security across operational technology environments in every industry, regardless of size or complexity. At the heart of the platform is Tosi Control, a cloud-based console that…
Google agrees to pay $135 million over Android data harvesting claims
Google agrees to pay $135 million to settle a proposed class action lawsuit brought by Android smartphone users over alleged unauthorized cellular data transmissions. After fees and administrative costs are deducted, the remaining settlement funds would be divided among eligible…
Samsung tackles shoulder surfing on Galaxy devices
Our phones hold our most personal details, and we use them everywhere. On the bus, in elevators, and while waiting in line, screens are often visible to people nearby. The closer phones align with daily habits, the more persistent privacy…
SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
SolarWinds has fixed six critical and high-severity vulnerabilities in its popular Web Help Desk (WHD) support ticketing and asset management solution, and is urging customers to upgrade to v2026.1 as soon as possible. The vulnerabilities The WHD vulnerabilities fixed were…
Dynatrace RUM delivers end-to-end visibility for cloud-native and AI-powered user experiences
Dynatrace announced next-generation Real User Monitoring (RUM) capabilities that deliver unified insights across web and mobile applications. RUM has become essential to understanding how applications perform for real users. But as organizations shift to dynamic, cloud-native, and AI-driven architectures, including…
Open-source malware zeroes in on developer environments
Open source malware activity during 2025 concentrated on a single objective: executing code inside developer environments, according to Sonatype. The focus reflected a broader shift in supply chain attacks away from end users and toward the tools, machines, and pipelines…
Hottest cybersecurity open-source tools of the month: January 2026
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. OpenAEV: Open-source adversarial exposure validation platform OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns…
What motivates hackers and what makes them walk away
Most hackers spend more time learning, testing, and comparing notes than breaking into systems. The work often happens alone or in small groups, shaped by curiosity, persistence, and a habit of examining how systems behave. Bugcrowd examined who these security…
A practical take on cyber resilience for CISOs
In this Help Net Security video, Shebani Baweja, CISO for Consumer, Private, Wealth & Business Banking at Standard Chartered, explains how security leaders should think about cyber resilience. She outlines why preparation for extreme events matters as much as day…
ImmuniWeb reports double-digit growth and platform advances
ImmuniWeb has hit another all-time sales record in 2025, while successfully sustaining double-digit year-over-year (YoY) growth and remaining profitable. During 2025, the company announced 4 major updates to the ImmuniWeb AI Platform. All products for web, mobile, and API security…
A fake romance turns into an Android spyware infection
ESET researchers have identified an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan. The operation relies on a malicious app disguised as a chat service that routes conversations through WhatsApp. Behind the romance lure, the…