Gigamon has released Gigamon Insights, an agentic AI application purpose-built for network-derived telemetry that will deliver instant guidance for security and IT operations teams. Launching with integrations into SIEM and observability platforms from Elastic and Splunk and cloud services from…
Tag: Help Net Security
DataLocker boosts data security with DL GO and MySafeConsole
DataLocker introduces DL GO, a secure and easy-to-use encrypted USB flash drive, alongside MySafeConsole, a lightweight cloud console that gives individuals and small teams centralized control, without enterprise cost. DL GO safeguards data with AES-256 XTS (FIPS 197) hardware encryption…
Garak: Open-source LLM vulnerability scanner
LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and toxic…
Deepfakes are rewriting the rules of geopolitics
Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate…
Fixing silent failures in security controls with adversarial exposure validation
Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, endpoints are protected, and SIEM rules are running. All good, right? Not so fast. Appearances can be deceiving.…
CISOs, stop chasing vulnerabilities and start managing human risk
Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than technical flaws. The survey…
AI agents are here, now comes the hard part for CISOs
AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that 52% of…
Plex tells users to change passwords due to data breach, pushes server owners to upgrade
Media streaming company Plex has suffered a data breach and is urging users to reset their account password and enable two-factor authentication. “An unauthorized third party accessed a limited subset of customer data from one of our databases. While we…
Hummingbird’s compliance and risk platform helps financial institutions manage risk
Hummingbird announced its unified platform for risk and compliance operations. The expanded platform brings together the full risk and compliance lifecycle with the launch of new solutions for both Transaction & Risk Monitoring and Customer Screening. Financial institutions, long stymied…
Vanta embeds agentic AI into policy and evidence workflows
Vanta has unveiled a new set of capabilities that integrates AI across core compliance and risk workflows. These features unify policy management with the Vanta AI Agent, expand first-party risk oversight and continuous monitoring for vendors, and deepen integrations, providing…
Relyance AI Data Defense Engineer secures AI-driven data
Relyance AI has released Data Defense Engineer, an AI-native feature that works 24/7 to understand, monitor, and protect thousands of data journeys, learns from every interaction, and autonomously enforces policies at machine speed. As organizations deploy AI systems, data becomes…
Cisco puts agentic AI at the core of Splunk Enterprise Security
Cisco introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR). Delivered within Splunk Enterprise Security 8.2, these advancements streamline…
NetApp StorageGRID 12.0 powers AI and data-intensive workloads
NetApp has released NetApp StorageGRID 12.0, a scalable, software-defined object storage solution designed for unstructured data. This latest version of StorageGRID introduces new capabilities designed to enhance AI initiatives, improve data security, and modernize organizations’ data infrastructure. Whether businesses are…
Fake npm 2FA reset email led to compromise of popular code packages
Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer’s account. “The packages were updated to contain a piece of code that would be executed on…
Download: Cyber defense guide for the financial sector
Data breaches cost more for financial organizations than they do for those in many other industries. In attempting to strengthen your financial organization’s cybersecurity, you must contend with evolving regulatory obligations, outdated IT infrastructure, and other challenges. How do you…
Silobreaker Requirements enables teams to improve threat intelligence
Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs). The new capability combines a PIR library with integrated monitoring tools and performance metrics, covering use cases across cyber…
Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups…
Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal
Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories represent 34 countries and include…
Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers
Researchers have spotted a malvertising (and clever malware delivery) campaign targeting IT workers in the European Union with fake GitHub Desktop installers. “We believe the goal of this campaign was to gain initial access to organizations for the purposes of…
Attackers test the limits of railway cybersecurity
Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, the railway industry is undergoing its…