The UK government launched a national campaign urging businesses to strengthen basic cyber defenses. The initiative follows new figures highlighting the scale of the threat. Serious cyber incidents cost businesses an average of £195,000, with about half of small firms…
Category: Help Net Security
Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits
Smart contract exploits continue to drain funds from blockchain projects, even as auditing tools and bug bounty programs grow. The problem is tied to how Ethereum Virtual Machine (EVM) contracts work: code is deployed permanently, runs autonomously, and often controls…
Microsoft signals breakthrough in data storage that can last for generations
Microsoft announced progress on Project Silica, its research initiative focused on developing durable, long-term quartz glass-based data storage technology. Close up of Writer showing high-speed multi-beam data encoding on laser pulses (Source: Microsoft) Rising global data volumes increase the need…
Virtana expands MCP Server to bring full-stack enterprise context to AI agents
Virtana announced the latest version of its Model Context Protocol (MCP) Server, bringing full-stack enterprise visibility directly to AI agents and LLMs so machines can understand enterprise operations as complete systems rather than isolated signals. Opening the Virtana platform to…
Protectt.ai enhances AppProtectt with advanced RASP and AI-driven mobile threat protection
Protectt.ai has launched the latest version of AppProtectt, its mobile application security solution featuring advanced Runtime Application Self-Protection (RASP) and AI-led behavioral monitoring. Protectt.ai works with leading banking, financial services, insurance, and digital-first enterprises to secure high-risk mobile applications against…
Redpanda brings identity, policy control, and data governance to AI agents
Redpanda announced the availability of new core capabilities in the Redpanda Agentic Data Plane (ADP), including a centralized AI gateway, AI observability and evaluation via OpenTelemetry, AI agents, and unified authentication and authorization. Together, these features form a unified governance…
Compliance Scorecard v10 delivers context-driven AI for explainable compliance decisions
Compliance Scorecard announced the release of v10, introducing governed, audit-ready AI designed to support defensible compliance decision-making for managed service providers (MSPs). Compliance Scorecard v10 applies AI only within a structured system of validated context and controls. The platform is…
Public mobile networks are being weaponized for combat drone operations
On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100 drones carrying explosive payloads and targeting aircraft on the ground. The drones used mobile networks…
Attackers keep finding the same gaps in security programs
Attackers keep getting in, often through the same predictable weak spots: identity systems, third-party access, and poorly secured perimeter devices. A new threat report from Barracuda based on Managed XDR telemetry from 2025 shows that many successful incidents still start…
Consumers feel less judged by AI debt collectors
Debt collection agencies are starting to use automated voice systems and AI-driven messaging to handle consumer calls. These systems help scale outreach, reduce call center staffing demands, and offer 24/7 service. A new study covering 11 European countries found that…
Securonix shifts security operations to measurable AI-driven productivity
Securonix announced Sam, the AI SOC Analyst, and the Securonix Agentic Mesh, introducing a new operating model for security operations that scales analyst productivity, governs AI in production, and delivers board-ready outcomes. At a time when security operations are overwhelmed…
Microsoft Edge 145 lands with major enterprise security upgrades
Microsoft has begun rolling out Edge 145 to the Stable release channel, adding several enterprise-focused security enhancements. The update is being deployed in phases, with some features available through preview and targeted release programs. Edge 145 brings expanded data protection…
Brinqa targets manual bottlenecks in exposure management with integrated AI agents
Brinqa has advanced its platform with the introduction of two new AI agents, the AI Attribution Agent and the AI Deduplication Agent, designed to address two of the most persistent and costly problems in enterprise security, unclear asset ownership and…
China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
A suspected China-linked cyberespionage group has been covertly exploiting a critical zero-day flaw (CVE-2026-22769) in Dell’s RecoverPoint for Virtual Machines software since at least mid-2024, according to new research from Google’s threat intelligence team and Mandiant. The attackers deployed stealthy…
Cloud Range launches AI Validation Range to safely test and secure AI before deployment
Cloud Range has introduced its AI Validation Range, a secure, contained virtual cyber range that enables organizations to test, train, and validate AI models, applications, and autonomous agents without risking exposure of sensitive production data. AI adoption is accelerating faster…
The era of the Digital Parasite: Why stealth has replaced ransomware
For years, ransomware encryption functioned as the industry’s alarm bell. When systems locked up, defenders knew an attack had occurred. Not anymore. New empirical data show that attackers are actively dismantling that signal. According to Picus Security’s Red Report 2026,…
Scammers exploit trust in Atlassian Jira to target organizations
Threat actors have leveraged legitimate email notification feature of Atlassian Jira to deliver localized scam emails at scale. The emails From late December 2025 through late January 2026, victims were targeted with spam emails from legitimate-looking Atlassian Jira Cloud addresses.…
Notepad++ secures update channel in wake of supply chain compromise
Notepad++, the popular text and source code editor for Windows whose update mechanism was hijacked last year, The post Notepad++ secures update channel in wake of supply chain compromise appeared first on Help Net Security. This article has been indexed…
One stolen credential is all it takes to compromise everything
Attackers often gain access through routine workflows like email logins, browser sessions, and SaaS integrations. A single stolen credential can give them a quick path to move across systems when access permissions are broad and visibility is fragmented. That pattern…
CYBERSPAN brings AI-driven, agentless network detection to MSSP environments
IntelliGenesis has announced the availability of CYBERSPAN for managed security service providers (MSSPs). The AI-driven network detection and response platform, originally developed to protect small and mid-sized contractors in the Defense Industrial Base, is now optimized for multi-tenant service delivery.…