Zenity expanded its AI security platform with incident-correlation intelligence, broader agentic browser coverage, and a new open-source tool for testing emerging LLM manipulation techniques. As organizations adopt AI agents, AI assistants and agentic browsers at scale, security teams face increasing…
Category: Help Net Security
SpecterOps and Tines partner to add native BloodHound and automated attack path workflows
SpecterOps and Tines announced a strategic partnership that brings native BloodHound integration to Tines, enabling customers to operationalize Attack Path Management through automated, AI-assisted workflows. This partnership combines SpecterOps’ identity Attack Path Management capabilities with Tines’ intelligent workflow platform, freeing…
Darktrace / Email strengthens behavioral detection, DLP, and SOC integrations
Darktrace announced a series of enhancements to Darktrace / EMAIL designed to detect and stop attacks spanning communications channels, strengthen outbound email protections, and streamline SOC integrations. The new capabilities will help security teams catch sophisticated attacks that evade existing…
Coro 3.7 rolls out redesigned Actionboard, unified ticketing, and AI insights
Coro announced the latest release of its unified platform. Coro 3.7 introduces user interface enhancements designed to accelerate remediation and streamline security management for SMBs. Coro has further refined its Actionboard, equipping IT professionals with essential information while minimizing unnecessary…
Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
A critical vulnerability (CVE-2025-55182) in React Server Components (RSC) may allow unauthenticated attackers to achieve remote code exection on the application server, the React development team warned on Wednesday. The maximum-severity vulnerability was privately reported by Lachlan Davidson and has…
Incode Deepsight targets deepfakes and synthetic identity threats
Incode has launched Deepsight, an AI defense tool that detects and blocks deepfakes, injected virtual cameras, and synthetic identity attacks. As AI systems increasingly interact and transact autonomously, the ability to instantaneously separate real people from AI-generated fakes becomes critical.…
CIS, Astrix, and Cequence partner on new AI security guidance
The Center for Internet Security, Astrix Security, and Cequence Security announced a strategic partnership to develop new cybersecurity guidance tailored to the unique risks of AI and agentic systems. This collaborative initiative builds on the CIS Critical Security Controls (CIS…
SandboxAQ launches AI-SPM platform to expose shadow AI risks
SandboxAQ announced an AI-SPM offering that provides visibility into where AI is being used in organizations’ tech stacks and evaluates AI assets for exploitable weaknesses, insecure dependencies, and exposure risks such as prompt injection, data leakage, and unauthorized access. The…
Smart grids are trying to modernize and attackers are treating it like an invitation
In this Help Net Security interview, Sonia Kumar, Senior Director Cyber Security at Analog Devices, discusses how securing decentralized smart grids demands a shift in defensive strategy. Millions of distributed devices are reshaping the attack surface, and she explains why…
AI vs. you: Who’s better at permission decisions?
A single tap on a permission prompt can decide how far an app reaches into a user’s personal data. Most of these calls happen during installation. The number of prompts keeps climbing, and that growing pressure often pushes people into…
A day in the life of the internet tells a bigger story
On any given day, the internet carries countless signals that hint at how networks behave behind the scenes. Researchers from RIPE NCC and several universities found a way to capture a detailed snapshot of that activity by studying one day…
The quantum clock is ticking and businesses are still stuck in prep mode
Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens when that moment arrives. A new report from the Trusted Computing Group (TCG) shows that most businesses say they grasp…
Bitwarden Access Intelligence helps enterprises take action on risky credentials
Bitwarden announced Bitwarden Access Intelligence for Enterprise plans. Access Intelligence provides visibility into weak, reused, or exposed credentials across critical applications, with guided remediation workflows for consistent credential updates at scale. The capability helps IT and security teams prioritize and…
Salt Security identifies external misuse and abuse of MCP servers by AI agents
Salt Security announced it is extending its API behavioral threat protection to detect and block malicious intent targeting Model Context Protocol (MCP) servers deployed within the AWS ecosystem. Building on the recent launch of Salt’s MCP Finder technology, Salt now…
Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
A sprawling network that’s seemingly maintained to serve (illegal) online gambling opportunities and deliver malware to Indonesian citizens is likely also being used to provide threat actors command and control (C2) and anonymity services. “The infrastructure has been active for…
HTB AI Range benchmarks the safety and limits of autonomous security agents
Hack The Box (HTB) unveiled HTB AI Range, a controlled AI cyber range built to test and benchmark the safety, limits, and capabilities of autonomous AI security agents. HTB AI Range replicates live, high stakes cyber battlegrounds tailored for enterprise…
BlackFog releases ADX Vision to block data loss from unapproved AI use
BlackFog announced the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision gives organizations the visibility and control needed to manage AI securely. Operating directly on the device, it detects shadow…
Wasabi Covert Copy strengthens cloud storage security
Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event…
Morphisec enhances Anti-Ransomware Suite to block evasive attacks across key blind spots
Morphisec announced an expansion of its Anti-Ransomware Assurance Suite, adding new capabilities that include Network Share Ransomware Protection for Windows and Linux, Identity Risk Visibility, and enhancements to its existing EDR Tampering Protection. These updates strengthen enterprise defenses against the…
Datadog introduces Bits AI SRE to automate alert investigation and root cause analysis
Datadog has launched Bits AI SRE, an AI agent aware of telemetry, architecture, and organizational context that investigates alerts and surfaces action able root cause in minutes, giving engineers the information they need to confidently resolve incidents faster, save engineering…