Sanctions are one of the tools Western governments use when they want to hit back at state-sponsored cyber threat actors. But do they actually work? That’s the question a group of current and former cybersecurity officials, analysts, and researchers tackled…
Category: Help Net Security
Commvault introduces Data Rooms to securely connect backup data with AI platforms
Commvault introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI platforms they rely on, or to their own AI initiatives, such as internal data lakes. By combining governed, self-service access…
Fortra DSPM helps organizations protect sensitive data across hybrid cloud
Fortra announced the launch of its new Data Security Posture Management (DSPM) solution to enable organizations to discover, classify, and protect sensitive data across their hybrid cloud. Fortra DSPM strengthens the company’s security portfolio by helping enterprises maintain visibility and…
Rapid7 strengthens security with AI-powered risk and vulnerability insights
Rapid7 announced AI-generated risk intelligence as part of the Rapid7 Command Platform. Delivered through Remediation Hub, the new capability accelerates remediation by giving security teams a contextual, and actionable view of each exposure, transforming vulnerability data into risk intelligence informed…
Sweet Security brings Runtime CNAPP visibility and protection to Windows environments
Sweet Security announced an extension of its Runtime CNAPP sensor to include Windows environments. With this launch, organizations can secure Windows workloads and applications in the cloud. The new capability brings the same visibility, real-time detection, risk prioritization, and automated…
Trellix unveils Helix integration with Hyperautomation to streamline SOC operations
Trellix announced Trellix Helix is now integrated with Trellix Hyperautomation, a no-code, drag-and-drop workflow builder that automates security processes. Trellix Helix provides customers with AI-powered context across all threat vectors and security tools in their environment for increased visibility, faster…
Acronis Cyber Protect Local brings unified cyber protection to cloud-restricted environments
Acronis announced the launch of Acronis Cyber Protect Local, a solution that delivers natively integrated cyber resilience for on-premises, sovereign private cloud, and air-gapped IT and OT environments. Designed for organizations where cloud deployment is not an option, the solution…
New Zscaler ZDX features strengthen zero trust and streamline performance monitoring
Zscaler unveiled new Zscaler Digital Experience (ZDX) innovations that help enterprises monitor and fix performance issues faster, achieving real-time insights across the internet and endpoint, cutting issue detection by 98%, and resolving issues in minutes to strengthen SLAs and minimize…
Python Foundation rejects US government grant earmarked for security improvements
The Python Software Foundation (PSF) has rejected a $1.5 million government grant due to restrictive conditions that would force the foundation to betray its mission and its community, the programming non-profit announced on Monday. “In January 2025, the PSF submitted…
Socure enhances RiskOS AI Suite with AI agents to transform identity, compliance, and risk decisioning
Socure unveiled an expanded RiskOS AI Suite of solutions featuring six breakthrough AI agents and assistants that substantially elevate the speed, intelligence, and precision of enterprise identity, compliance, and authentication operations. The investments Socure is making in AI position RiskOS…
Arctera InfoScale gains AI capabilities to identify and contain ransomware attacks
Arctera announced new AI-powered features in Arctera InfoScale that enable organizations to identify and respond to ransomware indicators in real time. By learning behavioral patterns across applications, storage and infrastructure, Arctera InfoScale is now able to instantly recognize the traits…
Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping
Privado.ai released several new capabilities to automate privacy assessments and data maps for privacy teams amid growing privacy enforcement for non-compliant personal data sharing. Leveraging AI agents to reason and take action, Privado.ai’s new Agentic Assessment solution populates 100% of…
Palo Alto Networks launches Prisma AIRS 2.0 to deliver end-to-end security across the AI lifecycle
Palo Alto Networks announced Prisma AIRS 2.0, a major platform upgrade that completes the native integration of recently acquired Protect AI to deliver a comprehensive AI security platform. This release directly confronts a critical enterprise challenge: 78% of organizations are…
Trulioo expands identity platform to strengthen fraud prevention and streamline compliance
Trulioo announced product enhancements designed to build trust at every stage of the digital journey, from initial verification and payment processing to ongoing compliance monitoring and risk assessment. The latest innovations, delivered across the Trulioo identity platform, provide transparency, fraud…
AI agents can leak company data through simple web searches
When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull sensitive…
Product showcase: Syteca – The human-centric insider threat management platform
Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data Breach Investigation Report, 60% of breaches involve the human element. The real risk often comes from within – from a…
Early reporting helps credit unions stop fraudulent transfers faster
In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to an evolving fraud landscape and strengthening payment security. As cybercriminals leverage social engineering and AI-driven tactics, Scaffidi explains how innovation…
Scammers target international students by threatening their visa status
In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university staff, they took advantage…
Proximity: Open-source MCP security scanner
Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources that a server makes available, and it can evaluate how those elements might introduce security risks. The tool also work…
PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them to redirect Internet traffic to potentially malicious sites, distribute malware, or intercept network traffic. While…