In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university staff, they took advantage…
Tag: Help Net Security
Proximity: Open-source MCP security scanner
Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources that a server makes available, and it can evaluate how those elements might introduce security risks. The tool also work…
PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them to redirect Internet traffic to potentially malicious sites, distribute malware, or intercept network traffic. While…
Cobalt transforms ad-hoc security testing into a continuous, managed program
Cobalt has undergone a large-scale expansion of its Cobalt Offensive Security Platform to transform offensive security from ad-hoc tests into a continuous, centrally managed program. The human led, AI-powered platform provides the visibility, control, and efficiency needed to secure organizations,…
Censys delivers internet intelligence to accelerate SOC triage and response
Censys announced a new offering designed to help SOC teams accelerate alert triage, reduce mean time to triage (MTTT), and accelerate incident response. The offering delivers near real-time and historical visibility into all internet-facing assets, enabling analysts to quickly enrich…
Nozomi Networks enhances OT security with latest Arc release
Nozomi Networks announced a cybersecurity solution designed to safely automate threat response in operational environments. With the latest release of Nozomi Arc, users gain automated threat prevention capabilities for OT endpoints. First launched in 2023, Nozomi Arc is the endpoint…
Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was used by unknown attackers to deliver LeetAgent, suspected commercial spyware. An analysis of the malware’s code and the campaign’s infrastructure…
IRISSCON 2025 to address the human impact on cybersecurity
Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject in depth at IRISSCON 2025, which takes place at Dublin’s Aviva Stadium on Wednesday November 5. Now in its 16th…
New Corero SmartWall ONE capability blocks encrypted DDoS threats without latency
Corero Network Security announced a new SmartWall ONE capability that stops encrypted application-layer attacks in real time without added latency or infrastructure. The enhancement addresses one of the most pressing blind spots in modern cybersecurity. With encryption now standard for…
Sublime Security secures $150 million to accelerate AI-driven, automated email protection
Sublime Security has raised $150 million in Series C funding led by Georgian to accelerate its agentic AI capabilities and bring new levels of proactive, automated defense to email security. Other participants include new investors Avenir and 01A, and existing…
Incode Agentic Identity links AI agents to verified humans
Incode Technologies has launched Agentic Identity, a solution that enables enterprises to verify, authorize, and continuously monitor autonomous AI agents that they interact with. By linking every agent to a verified human owner, enforcing explicit consent and scope controls, and…
Mastercard unveils Threat Intelligence to fight cyber-enabled payment fraud
Mastercard announced Mastercard Threat Intelligence, a threat intelligence offering applied to payments at scale. The solution combines Mastercard’s fraud insights and global network visibility with curated cyber threat intelligence from Recorded Future’s platform to help payment fraud and merchant compliance…
Elastic Streams uses agentic AI to simplify log parsing and accelerate issue resolution for SREstic
Elastic announced Streams, an agentic AI-powered solution that rethinks how teams work with logs to enable much faster incident investigation and resolution. Streams uses AI to automatically partition and parse raw logs to extract relevant fields, greatly reducing the effort…
AI Service Assist expands TeamDynamix ITSM platform with integrated intelligence
TeamDynamix introduced AI Service Assist, an extension of its core IT Service Management (ITSM) platform that leverages AI agents with native integration and automation for faster resolution, lower overhead, and enterprise-wide agility. AI Service Assist delivers value by expanding the…
Managing legacy medical devices that can no longer be patched
In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in healthcare environments. She explains how organizations can protect legacy systems, collaborate with vendors, and adopt…
FS launches PicOS AI Switch System to power large-scale AI and HPC workloads
FS has released its PicOS AI Switch System, a comprehensive networking solution engineered to support large-scale AI training, inference, and HPC workloads. By integrating advanced Broadcom Tomahawk series chips, the PicOS network operating system, and the AmpCon-DC management platform, the…
Chain of security weaknesses found in smart air compressor model
Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience can introduce new risks. Researchers at George Mason University found that the California Air…
Review: The Wireless Cookbook
The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who learn through building, experimenting, and breaking things to understand how they…
Cybersecurity jobs available right now: October 28, 2025
Analyst, Cybersecurity Threat Intelligence Brookfield Renewable | Canada | On-site – View job details As a Cybersecurity Threat Intelligence Analyst, you will run monthly vulnerability scans across IT and OT environments, track remediation progress, and report results. You will collect…
How to stop third-party risk from becoming your biggest headache
In this Help Net Security video, Robert Kraczek, Global IAM Strategist at One Identity, takes a deep dive into the growing problem of third-party cyber exposure and what it means for enterprise security. He walks through real-world examples of how…