Sweet Security announced an extension of its Runtime CNAPP sensor to include Windows environments. With this launch, organizations can secure Windows workloads and applications in the cloud. The new capability brings the same visibility, real-time detection, risk prioritization, and automated…
Category: Help Net Security
Trellix unveils Helix integration with Hyperautomation to streamline SOC operations
Trellix announced Trellix Helix is now integrated with Trellix Hyperautomation, a no-code, drag-and-drop workflow builder that automates security processes. Trellix Helix provides customers with AI-powered context across all threat vectors and security tools in their environment for increased visibility, faster…
Acronis Cyber Protect Local brings unified cyber protection to cloud-restricted environments
Acronis announced the launch of Acronis Cyber Protect Local, a solution that delivers natively integrated cyber resilience for on-premises, sovereign private cloud, and air-gapped IT and OT environments. Designed for organizations where cloud deployment is not an option, the solution…
New Zscaler ZDX features strengthen zero trust and streamline performance monitoring
Zscaler unveiled new Zscaler Digital Experience (ZDX) innovations that help enterprises monitor and fix performance issues faster, achieving real-time insights across the internet and endpoint, cutting issue detection by 98%, and resolving issues in minutes to strengthen SLAs and minimize…
Python Foundation rejects US government grant earmarked for security improvements
The Python Software Foundation (PSF) has rejected a $1.5 million government grant due to restrictive conditions that would force the foundation to betray its mission and its community, the programming non-profit announced on Monday. “In January 2025, the PSF submitted…
Socure enhances RiskOS AI Suite with AI agents to transform identity, compliance, and risk decisioning
Socure unveiled an expanded RiskOS AI Suite of solutions featuring six breakthrough AI agents and assistants that substantially elevate the speed, intelligence, and precision of enterprise identity, compliance, and authentication operations. The investments Socure is making in AI position RiskOS…
Arctera InfoScale gains AI capabilities to identify and contain ransomware attacks
Arctera announced new AI-powered features in Arctera InfoScale that enable organizations to identify and respond to ransomware indicators in real time. By learning behavioral patterns across applications, storage and infrastructure, Arctera InfoScale is now able to instantly recognize the traits…
Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping
Privado.ai released several new capabilities to automate privacy assessments and data maps for privacy teams amid growing privacy enforcement for non-compliant personal data sharing. Leveraging AI agents to reason and take action, Privado.ai’s new Agentic Assessment solution populates 100% of…
Palo Alto Networks launches Prisma AIRS 2.0 to deliver end-to-end security across the AI lifecycle
Palo Alto Networks announced Prisma AIRS 2.0, a major platform upgrade that completes the native integration of recently acquired Protect AI to deliver a comprehensive AI security platform. This release directly confronts a critical enterprise challenge: 78% of organizations are…
Trulioo expands identity platform to strengthen fraud prevention and streamline compliance
Trulioo announced product enhancements designed to build trust at every stage of the digital journey, from initial verification and payment processing to ongoing compliance monitoring and risk assessment. The latest innovations, delivered across the Trulioo identity platform, provide transparency, fraud…
AI agents can leak company data through simple web searches
When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull sensitive…
Product showcase: Syteca – The human-centric insider threat management platform
Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data Breach Investigation Report, 60% of breaches involve the human element. The real risk often comes from within – from a…
Early reporting helps credit unions stop fraudulent transfers faster
In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to an evolving fraud landscape and strengthening payment security. As cybercriminals leverage social engineering and AI-driven tactics, Scaffidi explains how innovation…
Scammers target international students by threatening their visa status
In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university staff, they took advantage…
Proximity: Open-source MCP security scanner
Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources that a server makes available, and it can evaluate how those elements might introduce security risks. The tool also work…
PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them to redirect Internet traffic to potentially malicious sites, distribute malware, or intercept network traffic. While…
Cobalt transforms ad-hoc security testing into a continuous, managed program
Cobalt has undergone a large-scale expansion of its Cobalt Offensive Security Platform to transform offensive security from ad-hoc tests into a continuous, centrally managed program. The human led, AI-powered platform provides the visibility, control, and efficiency needed to secure organizations,…
Censys delivers internet intelligence to accelerate SOC triage and response
Censys announced a new offering designed to help SOC teams accelerate alert triage, reduce mean time to triage (MTTT), and accelerate incident response. The offering delivers near real-time and historical visibility into all internet-facing assets, enabling analysts to quickly enrich…
Nozomi Networks enhances OT security with latest Arc release
Nozomi Networks announced a cybersecurity solution designed to safely automate threat response in operational environments. With the latest release of Nozomi Arc, users gain automated threat prevention capabilities for OT endpoints. First launched in 2023, Nozomi Arc is the endpoint…
Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was used by unknown attackers to deliver LeetAgent, suspected commercial spyware. An analysis of the malware’s code and the campaign’s infrastructure…