Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of data broker sites, and identifying…
Category: Help Net Security
Netcraft launches Phone Scam Disruption to stop brand impersonation calls and texts
Netcraft unveiled a new solution to help protect organizations’ customers from scam texts and phone calls that impersonate their brand. Netcraft’s Phone Scam Disruption automates the detection and takedown of fraudulent phone numbers used in impersonation scam campaigns, shutting down…
New Cranium AI features enhance compliance, security, and agentic AI scalability
Cranium AI released several new agentic AI capabilities and featured releases to its AI Governance and Security Platform. These new products and capabilities are designed to enable enterprises to scale faster with AI agents, streamline compliance and fortify AI systems…
New BarracudaONE features streamline MSP operations and strengthen multi-tenant security
Barracuda Networks unveiled enhancements to its AI-powered BarracudaONE platform. New capabilities, including bulk remediation for email threats, PSA integrations for automated billing and invoicing, and streamlined account management, are purpose-built for managed service providers (MSPs), helping them accelerate security across…
RGS IC Cloud Support enables Kubernetes management in restricted cloud environments
Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments. IC Cloud Support allows organizations working in airgapped or restricted regions of…
Red Hat AI 3 helps enterprises scale AI workloads across hybrid environments
Red Hat released Red Hat AI 3, an evolution of its enterprise AI platform. Bringing together the latest innovations from Red Hat AI Inference Server, Red Hat Enterprise Linux AI (RHEL AI), and Red Hat OpenShift AI, the platform simplifies…
U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal prosecutors in Brooklyn have charged Chen Zhi, also known as “Vincent,”…
Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots
Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow data. This new capability addresses critical challenges facing security operations (SOC) teams by delivering visibility across AWS Virtual Private Cloud…
A safer way to break industrial systems (on purpose)
Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a way to make that easier. Their work introduces a container-based framework that lets researchers and practitioners…
New Jscrambler AI Assistant accelerates PCI DSS compliance decisions
Jscrambler announced the AI Assistant for PCI DSS script authorization workflows, which delivers context-rich insights and expert recommendations to enable prompt and confident script authorization decisions and justifications. PCI DSS v4 requirements 6.4.3 and 11.6.1 mandate the inventorying, authorizing, and…
Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks
Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams to detect, triage, and take down brand and executive threats across social media and the open, deep, and dark web.…
Maltrail: Open-source malicious traffic detection system
Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists, as well as static lists compiled from antivirus reports and user-defined sources. These “trails” can include…
Building trust in AI-powered security operations
In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability to process vast amounts of data and detect anomalies faster than…
The power grid is getting old, and so is the cybersecurity protecting it
Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, water, and transport are reaching the end of their design life.…
The diagnosis is in: Mobile health apps are bad for your privacy
Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components. Study design showing data collection, static security analysis (MobSF, RiskInDroid, OWASP),…
LevelBlue acquires Cybereason to expand global MDR, XDR, and threat response leadership
LevelBlue has signed a definitive agreement to acquire Cybereason, a cybersecurity firm known for its Extended Detection and Response (XDR) platform, threat intelligence team, and digital forensics and incident response (DFIR) capabilities. For clients and strategic partners, the acquisition delivers…
Picus Security uses AI to turn threat intelligence into attack simulations
Picus Security launched new AI-powered breach and attack simulation (BAS) capabilities within the Picus Security Validation Platform. This introduces a new level of speed and intelligence, enabling security teams to create and simulate complex attack scenarios, validate the effectiveness of…
Regula simplifies identity verification with its new all-in-one IDV Platform
Regula has launched its Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a single, unified workflow. Built to scale according to an organization’s growth pace and fully vendor-agnostic, the platform…
NetApp strengthens its enterprise data platform with new AI-focused innovations
NetApp unveiled new products, strengthening its enterprise-grade data platform for AI innovation. The new NetApp AFX decouples performance and capacity with a disaggregated NetApp ONTAP that runs on the new NetApp AFX 1K storage system. NetApp AI Data Engine is…
Visa’s Trusted Agent Protocol sets new standard for secure agentic transactions
Visa unveiled the Trusted Agent Protocol, establishing a foundational framework for agentic commerce that enables secure communication between AI agents and merchants during every step of a transaction. The Trusted Agent Protocol aims to address the challenges facing agent-driven commerce,…