An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in the Middle East. Stryker confirmed in a Form 8-K filing with…
Tag: Help Net Security
Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans
Codoxo has announced the launch of Deepfake Detection, an AI-driven fraud detection tool now being deployed by health plans across the U.S. The solution helps identify AI-generated or manipulated medical documentation and diagnostic images submitted in support of claims before…
Stop fixing OT security with IT thinking
In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices break down on shop floors, where PLCs and decade-old firmware were…
Agentic attack chains advance as infostealers flood criminal markets
Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums, illicit marketplaces, and underground chat services shows a threat environment where…
Wireless vulnerabilities are doubling every few years
Wireless vulnerabilities are being disclosed at a rate that has no precedent in the fifteen-year history of systematic tracking. In 2025, researchers published 937 new wireless-related CVEs, an average of 2.5 per day, according to a threat report from Bastille…
Does Anthropic deserve the trust of the cybersecurity community?
The cybersecurity industry runs on trust. The belief that when a vendor says they will behave a certain way, they will, that critical CVEs are in fact critical, or when companies say they’re GDPR compliant, they really are. But earning…
ShinyHunters claims new campaign targeting Salesforce Experience Cloud sites
Salesforce customers have, once again, been targeted by the ShinyHunters group – or, at least, it’s what the group claims. Attackers modified and abused benign tool On Saturday, Saleforce confirmed that its security team has identified an attack campaign by…
Researchers uncover AI-powered vishing platform
A vishing-as-a-service platform that helps scammers carry out so-called “press 1” scams is misusing text-to-speech (TTS) capabilities provided by AI voice technology company ElevenLabs, Mirage Security researchers claim. How “press 1” vishing scams work For “press 1” scams, fraudsters spoof…
Fortanix helps enterprises build resilience with multi-sourced quantum entropy
Fortanix announced a new multi-sourced quantum entropy capability within Fortanix Data Security Manager (DSM), enabling enterprises to diversify encryption key generation at the origin of trust. Through partnerships with Qrypt and Quantum Dice, Fortanix integrates independent, physics-based quantum entropy sources…
Network Map 2.0 provides live network mapping and faster risk containment
Zero Networks has announced Network Map 2.0, an advancement in real-time network mapping designed to help large enterprises eliminate decision paralysis, reduce blast radius and turn visibility into immediate, enforceable action. Network Map 2.0 capability replaces static, point-in-time visualizations that…
Vicarius vIntelligence brings continuous risk validation and AI-driven security automation
Vicarius has announced the launch of vIntelligence, a new product that introduces agentic intelligence and continuous validation to the company’s security portfolio. With this release, Vicarius becomes a two-product company. Its flagship platform, vRx, moves beyond detection to provide advanced,…
Meta turns to AI to sniff out scams on Facebook, Messenger and WhatsApp
Meta’s new tools on Facebook, Messenger, and WhatsApp protect users from scams. They use advanced AI systems to analyze text, images, and surrounding context and identify sophisticated scam patterns. Facebook alerts for suspicious friend requests (Source: Meta) The systems detect…
Anthropic forms institute to study long-term AI risks facing society
Anthropic has established the Anthropic Institute, a research unit focused on studying the societal effects of AI and informing policy responses to risks from more advanced systems. “In the five years since Anthropic began, AI progress has moved incredibly quickly.…
Microsoft patches 80+ vulnerabilities, six flagged as “more likely” to be exploited
On March 2026 Patch Tuesday, Microsoft addressed 80+ vulnerabilities affecting its software and cloud services. Of these, two were publicly disclosed, but not actively exploited. Privilege escalation vulnerabilities abound The two publicly disclosed flaws are CVE-2026-21262, a vulnerability in SQL…
YouTube draws a line on deepfakes involving politicians and journalists
With deepfakes becoming more common, YouTube has expanded access to its AI-driven likeness detection system to a pilot group of government officials, journalists and political candidates. The step follows an earlier rollout of the tool to creators in the company’s…
Armis improves vulnerability accuracy and speed with unified real-time visibility
Armis has announced Armis Centrix for Vulnerability Management Detection and Response. The solution enables security teams to identify and validate vulnerabilities across all organizational assets in real time. Armis’ unified approach to vulnerability assessment delivers greater accuracy, faster detection times,…
Forescout replaces manual audits with automated, always-on compliance validation
Forescout Technologies has announced Automated Security Controls Assessment, a new Forescout 4D Platform capability that continuously evaluates trust, control effectiveness and compliance posture across an organization’s attack surface. Replacing manual, static and error-prone spreadsheet-driven audits with real-time, automated evidence-based collection…
Virtana enables full-stack root cause analysis beyond legacy APM
Virtana has launched an Application Observability offering that traces performance issues from application code through infrastructure, networks, storage, and AI workloads to deliver evidence-based root cause analysis without manual correlation. Built for autonomous operations at scale, the solution redefines the…
Secureframe automates CMMC compliance with secure infrastructure and AI SSPs
Secureframe has launched Secureframe Defense, an end-to-end solution for CMMC certification. It provides secure infrastructure deployment, AI-generated System Security Plans (SSPs), policies, and comprehensive monitoring that Defense Industrial Base (DIB) organizations need to achieve and maintain certification faster, without unnecessary…
OPSWAT delivers AI-powered perimeter defense with unified zero-day verdicts
OPSWAT has introduced MetaDefender Aether, an AI-powered decision engine for fast zero-day detection, purpose-built for the perimeter. Unlike sandbox or antivirus solutions designed for endpoint protection, MetaDefender Aether intercepts files at every entry point, e.g. file transfers, removable media, email…