Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject in depth at IRISSCON 2025, which takes place at Dublin’s Aviva Stadium on Wednesday November 5. Now in its 16th…
Category: Help Net Security
New Corero SmartWall ONE capability blocks encrypted DDoS threats without latency
Corero Network Security announced a new SmartWall ONE capability that stops encrypted application-layer attacks in real time without added latency or infrastructure. The enhancement addresses one of the most pressing blind spots in modern cybersecurity. With encryption now standard for…
Sublime Security secures $150 million to accelerate AI-driven, automated email protection
Sublime Security has raised $150 million in Series C funding led by Georgian to accelerate its agentic AI capabilities and bring new levels of proactive, automated defense to email security. Other participants include new investors Avenir and 01A, and existing…
Incode Agentic Identity links AI agents to verified humans
Incode Technologies has launched Agentic Identity, a solution that enables enterprises to verify, authorize, and continuously monitor autonomous AI agents that they interact with. By linking every agent to a verified human owner, enforcing explicit consent and scope controls, and…
Mastercard unveils Threat Intelligence to fight cyber-enabled payment fraud
Mastercard announced Mastercard Threat Intelligence, a threat intelligence offering applied to payments at scale. The solution combines Mastercard’s fraud insights and global network visibility with curated cyber threat intelligence from Recorded Future’s platform to help payment fraud and merchant compliance…
Elastic Streams uses agentic AI to simplify log parsing and accelerate issue resolution for SREstic
Elastic announced Streams, an agentic AI-powered solution that rethinks how teams work with logs to enable much faster incident investigation and resolution. Streams uses AI to automatically partition and parse raw logs to extract relevant fields, greatly reducing the effort…
AI Service Assist expands TeamDynamix ITSM platform with integrated intelligence
TeamDynamix introduced AI Service Assist, an extension of its core IT Service Management (ITSM) platform that leverages AI agents with native integration and automation for faster resolution, lower overhead, and enterprise-wide agility. AI Service Assist delivers value by expanding the…
Managing legacy medical devices that can no longer be patched
In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in healthcare environments. She explains how organizations can protect legacy systems, collaborate with vendors, and adopt…
FS launches PicOS AI Switch System to power large-scale AI and HPC workloads
FS has released its PicOS AI Switch System, a comprehensive networking solution engineered to support large-scale AI training, inference, and HPC workloads. By integrating advanced Broadcom Tomahawk series chips, the PicOS network operating system, and the AmpCon-DC management platform, the…
Chain of security weaknesses found in smart air compressor model
Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience can introduce new risks. Researchers at George Mason University found that the California Air…
Review: The Wireless Cookbook
The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who learn through building, experimenting, and breaking things to understand how they…
Cybersecurity jobs available right now: October 28, 2025
Analyst, Cybersecurity Threat Intelligence Brookfield Renewable | Canada | On-site – View job details As a Cybersecurity Threat Intelligence Analyst, you will run monthly vulnerability scans across IT and OT environments, track remediation progress, and report results. You will collect…
How to stop third-party risk from becoming your biggest headache
In this Help Net Security video, Robert Kraczek, Global IAM Strategist at One Identity, takes a deep dive into the growing problem of third-party cyber exposure and what it means for enterprise security. He walks through real-world examples of how…
Albireo PCS delivers secure, managed cloud alternative to on-premise servers
Albireo Energy launched Private Cloud Services (PCS), a secure, fully managed cloud service designed to host and protect Building Automation System (BAS) and Energy Power Management Systems (EPMS) data without the capital expense, complexity, or risk of traditional on-premise servers.…
Zumigo enhances fraud prevention with low-code tools and passwordless authentication
Zumigo has upgraded its solutions designed to help businesses fortify their defenses against rising sophisticated consumer fraud with an identity-first security approach. Recognizing that consumer and user access points are often exploited for fraud and attacks, Zumigo has evolved its…
Jumio introduces selfie.DONE to simplify digital identity verification
Jumio announced the launch of selfie.DONE, a new solution that delivers on the company’s vision for true reusable identity. selfie.DONE empowers trusted users to be instantly recognized and reverified with just a selfie, eliminating the need to rescan their ID…
eBook: A quarter century of Active Directory
Active Directory (AD) remains the backbone of enterprise identity and a prime target for attackers. Explore its 25-year history, evolving risks, and how organizations can modernize password security. This eBook shows why AD defenses must evolve and how to stop…
Ransomware, extortion groups adapt as payment rates reach historic lows
Ransomware groups are facing an economic downturn of their own: In Q3 2025, only 23 percent of victims paid a ransom, and for data theft incidents that involved no encryption, the payment rate dropped to just 19 percent, according to…
72 states sign first global UN Convention against Cybercrime
The world’s first global convention to prevent and respond to cybercrime opened for signature today in Hanoi, Vietnam, and will remain open at United Nations Headquarters in New York until 31 December 2026. Adopted by the UN General Assembly in…
Can your earbuds recognize you? Researchers are working on it
Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step could be inside the ear. New research explores how the ear canal’s unique acoustic properties can be used to verify…