Category: Help Net Security

Google disrupts proxy network used by 550+ threat groups

Google has disrupted Ipidea, a massive residential proxy network consisting of user devices that are being used as the last-mile link in cyberattack chains. “In a single seven day period in January 2026, GTIG observed over 550 individual threat groups…

Virtue AI AgentSuite enables enterprises to test and secure AI agents

Virtue AI announced AgentSuite, a multi-layer security and compliance platform for enterprise AI agents. Organizations worldwide are deploying agents that modify databases, trigger payments, and access systems containing sensitive information. AgentSuite is the AI-native platform built specifically for this new…

N-able brings AI to endpoint, security, and recovery

N-able announced enhanced AI capabilities across its platform to help organizations operate securely, efficiently, and resiliently as AI reshapes both cyberthreats and IT complexity. As AI accelerates the speed, scale, and sophistication of cyberattacks, businesses are struggling to defend themselves.…

Samsung tackles shoulder surfing on Galaxy devices

Our phones hold our most personal details, and we use them everywhere. On the bus, in elevators, and while waiting in line, screens are often visible to people nearby. The closer phones align with daily habits, the more persistent privacy…

Open-source malware zeroes in on developer environments

Open source malware activity during 2025 concentrated on a single objective: executing code inside developer environments, according to Sonatype. The focus reflected a broader shift in supply chain attacks away from end users and toward the tools, machines, and pipelines…

Hottest cybersecurity open-source tools of the month: January 2026

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. OpenAEV: Open-source adversarial exposure validation platform OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns…

What motivates hackers and what makes them walk away

Most hackers spend more time learning, testing, and comparing notes than breaking into systems. The work often happens alone or in small groups, shaped by curiosity, persistence, and a habit of examining how systems behave. Bugcrowd examined who these security…

A practical take on cyber resilience for CISOs

In this Help Net Security video, Shebani Baweja, CISO for Consumer, Private, Wealth & Business Banking at Standard Chartered, explains how security leaders should think about cyber resilience. She outlines why preparation for extreme events matters as much as day…