The Edgescan 2025 Vulnerability Statistics Report offers a data-rich snapshot of the global cybersecurity landscape, drawing from thousands of assessments and penetration tests conducted in 2024. Now in its 10th year, the report analyzes full-stack security trends across industries, highlighting…
Category: Help Net Security
Binarly Transparency Platform 3.0 prioritizes vulnerabilities based on active exploitation
Binarly announced the rollout of its flagship Binarly Transparency Platform 3.0, a major update that fuses live threat‑intelligence signals with an exploitation‑aware scoring system to help enterprise teams prioritize the mitigation of vulnerabilities with the most immediate risk. The release…
Coaching AI agents: Why your next security hire might be an algorithm
Security teams are drowning in alerts. The sheer volume of threats, suspicious activity, and false positives makes it nearly impossible for analysts to investigate everything effectively. Enter agentic AI, capable of completing hundreds of tasks simultaneously without tiring. Organizations increasingly…
A new era of cyber threats is approaching for the energy sector
Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful attack can be severe, potentially disrupting energy supplies…
Review: Artificial Intelligence for Cybersecurity
Artificial Intelligence for Cybersecurity is a practical guide to how AI and machine learning are changing the way we defend digital systems. The book aims to explain how AI can help solve real cybersecurity problems. It does that well, but…
One in three security teams trust AI to act autonomously
While AI adoption is widespread, its impact on productivity, trust, and team structure varies sharply by role and region, according to Exabeam. The findings confirm a critical divide: 71% of executives believe AI has significantly improved productivity across their security…
Bitdefender GravityZone PHASR sets new standard for endpoint security solutions
Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) is an endpoint security solution that dynamically tailors hardening for each user, ensuring that security configurations align with user-intended privileges and behaviors and adapt to shrink attack surfaces. “Attackers are now…
TufinAI strengthens network security policy management
Tufin announced TufinAI, an AI-powered engine designed to transform the way enterprises manage and protect their networks. Backed by its strong financial foundation and record results in 2024, Tufin has been able to invest boldly in innovation – pushing far…
IRONSCALES introduces deepfake protection capabilities
IRONSCALES announced deepfake protection for enterprise email security. The announcement comes as deepfake-driven social engineering attacks continue to gain momentum. From 2022 to 2023, the total volume of deepfake-driven cyberattacks levied against private enterprises grew by a staggering 1,000% globally…
Armis expands vulnerability exposure and assessment capabilities
Armis is expanding its vulnerability exposure and assessment capabilities with the free availability of the Armis Vulnerability Intelligence Database. The community-driven database integrates exploited vulnerabilities, emerging threats and AI-powered insights, providing the cybersecurity industry with the knowledge organizations need to…
NinjaOne unifies vulnerability and patch management
NinjaOne announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so…
Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs
MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures (TTPs) used to target VMware ESXi hypervisors. About MITRE ATT&CK MITRE ATT&CK is a regularly…
2025 Data Breach Investigations Report: Third-party breaches double
The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according to Verizon’s 2025 Data Breach Investigations Report. Researchers analyzed 22,052 real-world security incidents, of which 12,195 were confirmed data breaches.…
Attackers phish OAuth codes, take over Microsoft 365 accounts
Suspected Russian threat actors are using OAuth-based phishing attacks to get targets to grant them access to their Microsoft 365 (M365) accounts. “The primary tactics observed involve the attacker requesting victim’s supply Microsoft Authorization codes, which grant the attacker with…
BlinkOps Security Agent Builder enables organizations to create unlimited AI agents
BlinkOps launched No-Code Security Agent Builder, an enterprise platform that allows security teams to create an unlimited number of custom security agents tailored for their unique environments. The platform gives organizations full control over how agents operate, what they access,…
Cohesity RecoveryAgent automates time-consuming and manual tasks
Cohesity announced Cohesity RecoveryAgent, a new AI-powered cyber orchestration solution for Cohesity NetBackup and DataProtect customers. RecoveryAgent automates cyber recovery preparation, testing, compliance, and response, enabling customers to recover from cyber incidents faster. It offers intelligent, customizable recovery blueprints and…
1Password provides secure access for AI agents
1Password announced Agentic AI Security capabilities as part of the 1Password Extended Access Management platform, built to secure and govern identities, credentials, and access of autonomous AI agents in the enterprise. As agentic AI reshapes how work gets done, from…
Ivanti Ring Deployment reduces risks associated with patching systems
Ivanti has launched Ring Deployment in Ivanti Neurons for Patch Management. The new capability allows IT teams to reduce risks associated with patching systems by creating and configuring deployment rings, enabling them to strategically group devices based on organizational needs…
Veeam simplifies the protection of organizations’ Microsoft Entra ID users
Veeam Software announced Veeam Data Cloud for Microsoft Entra ID. With Entra ID (formerly Azure AD) facing over 600 million attacks daily, protecting organizations’ digital identity has never been more critical. Veeam Data Cloud for Microsoft Entra ID is a…
When confusion becomes a weapon: How cybercriminals exploit economic turmoil
It begins with a simple notification: “Markets in Free Fall.” Within moments, the headlines multiply: new tariffs, emergency actions, plummeting consumer confidence. Across boardrooms and break rooms, anxiety ripples at every level. People begin refreshing inboxes and apps for guidance…