Scamnetic announced a new trajectory for its patented IDeveryone solution, capable of identity-proofing virtually anyone globally during a consumer or business payment. IDeveryone Payment Protection delivers extensive protection across all payment types, including push and digital payments, cryptocurrency, checks, wire…
Tag: Help Net Security
Firmware scanning time, cost, and where teams run EMBA
Security teams that deal with connected devices often end up running long firmware scans overnight, checking progress in the morning, and trying to explain to colleagues why a single image consumed a workday of compute time. That routine sets the…
Product showcase: Orbot – Tor VPN for iOS
Orbot for iOS is a free, open-source networking tool that routes supported app traffic through the Tor network. Developed by the Guardian Project, it is intended for users who want to reduce tracking and limit network-level monitoring on iPhone and…
How AI image tools can be tricked into making political propaganda
A single image can shift public opinion faster than a long post. Text to image systems can be pushed to create misleading political visuals, even when safety filters are in place, according to a new study. The researchers examined whether…
Lumo expands its Lumo AI assistant with encrypted, project-based workspaces
Lumo is Proton’s AI assistant, built with a focus on privacy and user control. It runs on Proton’s infrastructure and is designed so conversations are not used to train models or retained beyond what is required to provide the service.…
Wine 11 brings major architectural work, synchronization changes, 600+ bug fixes
Wine, originally short for “Wine Is Not an Emulator,” is a compatibility layer that allows Windows applications to run natively on POSIX-compliant operating systems, including Linux, macOS, and BSD. Rather than running a full copy of Windows or simulating its…
Acronis Archival Storage brings compliance-ready, S3-compatible cold storage to MSPs
Acronis announced the launch of Acronis Archival Storage, a long-term, compliant, and cost-efficient data storage and protection solution designed for Managed Service Providers (MSPs) and their small-to-medium business (SMBs) customers. With Acronis Archival Storage, users can retain large amounts of…
F5 NGINXaaS for Google Cloud protects cloud-native applications
F5 launched F5 NGINXaaS for Google Cloud, a cloud-native application delivery-as-a-service solution. Developed in collaboration with Google Cloud, this offering addresses the challenges of delivering modern and containerized applications by consolidating load balancing, security, and observability into a unified solution,…
Concentric AI releases Private Scan Manager for AWS GovCloud (US)
Concentric AI announced further expansion of the Private Scan Manager functionality in its Semantic Intelligence AI and data security governance platform to include AWS GovCloud (US). Government agencies, contractors, partners, and other organizations—including those that use Microsoft 365 Government Community…
AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations
Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in Salesforce Experience Cloud applications. The tool focuses on the Aura framework, which underpins many Salesforce user interfaces and plays a…
Noction adds automatic anomaly detection to IRP v4.3 for faster DDoS mitigation
Noction has released Noction Intelligent Routing Platform (IRP) v4.3, delivering new capabilities in automated DDoS detection, routing safety, and operational control for modern IP networks. A key highlight of IRP v4.3 is the introduction of Automatic Anomaly Detection (AAD), a…
Minimal Ubuntu Pro expands Canonical’s cloud security offerings
Canonical has released Minimal Ubuntu Pro images for use on public cloud platforms, aiming to give teams a smaller base image with a narrower software footprint. The solution is designed for organizations that want tighter control over what runs inside…
Browser-in-the-Browser phishing is on the rise: Here’s how to spot it
Browser-in-the-Browser (BitB) phishing attacks are on the rise, with attackers reviving and refining the technique to bypass user skepticism and traditional security controls. BitB phishing: Dangerous and effective For BitB phishing, attackers create a pop-up window inside a real web…
AI EdgeLabs launches Compliance Center and Linux Audit for NIS2 and CRA readiness
AI EdgeLabs announced the launch of Compliance Center and Linux Audit. Purpose-built for organizations facing NIS2, CRA, and global critical-infrastructure mandates, the new capabilities replace manual reporting and scan-based compliance with continuous visibility, automated control coverage, and real-time posture insights.…
Parrot OS shares its 2026 plans for security tools and platform support
Parrot OS is a Debian-based Linux distribution built for cybersecurity work. Security practitioners use it for penetration testing, digital forensics, malware analysis, and privacy-focused research. The operating system bundles security tools, development utilities, and privacy features into a maintained platform…
Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains
Security teams are dealing with pressures tied to AI use, geopolitical instability, and expanding cybercrime that reach beyond technical controls, according to findings from the World Economic Forum’s Global Cybersecurity Outlook 2026. AI drives risk growth and defensive change Respondents…
Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become critical infrastructure during crises and conflicts. He explains how it influences cybersecurity priorities, from encryption and abuse prevention to incident…
Teaching cybersecurity by letting students break things
Cybersecurity students show higher engagement when the work feels tangible. A new study from Airbus Cybersecurity and Dauphine University describes what happens when courses move beyond lectures and place students inside structured hacking scenarios, social engineering exercises, and competitive games.…
Turning cyber metrics into decisions leaders can act on
In this Help Net Security video, Bryan Sacks, Field CISO at Myriad360, explains how security leaders can measure cybersecurity in ways that matter to executives and boards. He argues that metrics should support decisions, not exist for reporting alone. The…
What insurers expect from cyber risk in 2026
Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers, and security teams are feeling that pressure across underwriting, claims, and risk management. A new global study by CyberCube examines…