Category: Help Net Security

Deepfakes, fraud, and the fight for trust online

In this Help Net Security video, Michael Engle, Chief Strategy Officer at 1Kosmos, explains how deepfakes are changing online identity verification. He describes how fake IDs and synthetic identities are being used for account signups and takeovers. Engle outlines why…

Cybersecurity jobs available right now: November 4, 2025

Cybersecurity Architect Alstom | France | On-site – View job details As a Cybersecurity Architect, you will analyze solutions, identify associated risks, and propose security architecture models by involving various cybersecurity experts (network, IAM, SIEM, SOC, etc.) and applying the…

Financial services can’t shake security debt

In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones linger longer, creating a kind of software “interest” that keeps growing, according to Veracode’s 2025 State of Software Security report.…

Zenity delivers runtime protection for OpenAI’s AgentKit

Zenity announced runtime protection for OpenAI’s AgentKit, providing enterprise-grade enforcement that detects and blocks data leakage, secret exposure and unsafe agent behavior in real time. This launch follows Zenity Labs’ recent research exposing critical gaps in OpenAI’s AgentKit guardrails that…

A new way to think about zero trust for workloads

Static credentials have been a weak point in cloud security for years. A new paper by researchers from SentinelOne takes direct aim at that issue with a practical model for authenticating workloads without long-lived secrets. Instead of relying on static…

Securing real-time payments without slowing them down

In this Help Net Security interview, Arun Singh, CISO at Tyro, discusses what it takes to secure real-time payments without slowing them down. He explains how analytics, authentication, and better industry cooperation can help stay ahead of fraud. Singh also…

Europe’s phone networks are drowning in fake calls

Caller ID spoofing has become one of Europe’s most persistent enablers of cyber fraud. A new position paper from Europol warns that manipulated phone identities now drive much of the continent’s financial and social engineering crime, making it difficult for…

CISA and partners take action as Microsoft Exchange security risks mount

In partnership with international cybersecurity agencies, the US Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) outlined security best practices for organizations that use on-premises versions of Microsoft Exchange Server. Microsoft Exchange servers are regularly targeted…

AI chatbots are sliding toward a privacy crisis

AI chat tools are taking over offices, but at what cost to privacy? People often feel anonymous in chat interfaces and may share personal data without realizing the risks. Cybercriminals see the same opening, and it may only be a…

Passwordless adoption moves from hype to habit

With the average person juggling more than 300 credentials and credential abuse still the top attack vector, the password’s decline is long overdue. Across every major sector, organizations are changing how users log in, and new data shows the shift…

The secret to audit success? Think like your auditor

In this Help Net Security video, Doug Kersten, CISO at Appfire, shares practical, experience-driven advice on how CISOs can avoid the most common mistakes when preparing for an audit. He breaks down what often frustrates auditors, why organization and clear…