Akira ransomware affiliates are not leveraging an unknown, zero-day vulnerability in SonicWall Gen 7 firewalls to breach corporate networks, the security vendor shared today. “Instead, there is a significant correlation with threat activity related to CVE-2024-40766, which was previously disclosed…
Tag: Help Net Security
Photos: Black Hat USA 2025
Here’s a look inside Black Hat USA 2025. The featured vendors are: Stellar Cyber, Vonahi Security, Gurucul, Check Point, HackerOne, EasyDMARC, Elastic, Google, Tines, Veracode, VioletX, Pentera, Keep Aware, Oleria, SpyCloud, Trend Micro and Picus Security. The post Photos: Black…
Top solutions to watch after Black Hat USA 2025
Black Hat USA 2025 was packed with innovation, with companies showing off tools built to get ahead of what’s coming next. From smarter offensive security to new ways of spotting attacks faster, the conference had no shortage of exciting developments.…
Beyond PQC: Building adaptive security programs for the unknown
In this Help Net Security interview, Jordan Avnaim, CISO at Entrust, discusses how to communicate the quantum computing threat to executive teams using a risk-based approach. He explains why post-quantum cryptography (PQC) is an urgent and long-term priority. Avnaim also…
AI can write your code, but nearly half of it may be insecure
While GenAI excels at producing functional code, it introduces security vulnerabilities in 45 percent of cases, according to Veracode’s 2025 GenAI Code Security Report, which analyzed code produced by over 100 LLMs across 80 real-world coding tasks. Vibe coding “The…
Elastic AI SOC Engine helps SOC teams expose hidden threats
Elastic AI SOC Engine (EASE) is a new serverless, easy-to-deploy security package that brings AI-driven context-aware detection and triage into existing SIEM and EDR tools, without the need for an immediate migration or replacement. EASE delivers agentless integrations, AI-driven alert…
Cybercriminals are getting personal, and it’s working
Cybercriminals are deploying unidentifiable phishing kits (58% of phishing sites) to propagate malicious campaigns at scale, indicating a trend towards custom-made or obfuscated deployments, according to VIPRE Security. These phishing kits can’t easily be reverse-engineered, tracked, or caught. AI makes…
Energy companies are blind to thousands of exposed services
Many of America’s largest energy providers are exposed to known and exploitable vulnerabilities, and most security teams may not even see them, according to a new report from SixMap. Researchers assessed the external attack surface of 21 major energy companies,…
Absolute Security upgrades platform with AI assistant and real-time risk response tools
Absolute Security announced new innovations available on the Absolute Resilience Platform. An advanced GenAI assistant enables natural-language queries that instantly answer vital questions about the security and compliance status of endpoint devices. Enhanced application control helps ensure critical endpoint and…
7AI enables end-to-end autonomous security operations
7AI is debuting three innovations that make 7AI a platform to handle the security workflow through AI agents, from consuming zero-day alerts to novel threat investigation through contextual analysis to authorized remediation. Dynamic Reasoning enables AI agents to autonomously investigate…
Abnormal AI spots risky misconfigs in Microsoft 365 before attackers do
Abnormal AI updated Security Posture Management product, bringing AI-driven protection, automated prioritization, and remediation guidance to customers’ Microsoft 365 environments. As Microsoft 365 environments become more complex, accidental misconfigurations are now a leading cause of cloud email vulnerabilities. The growing…
Open-source server management platform Proxmox VE 9.0 released
Proxmox Virtual Environment (VE) 9.0 introduces advancements in both storage and networking capabilities, addressing critical enterprise demands. A highlight is the long-awaited support for snapshots on thick-provisioned LVM shared storage, improving storage management capabilities especially for enterprise users with Fibre…
Adobe patches critical Adobe Experience Manager Forms vulnerabilities with public PoC
Adobe has released an emergency security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE), which fix two critical vulnerabilities (CVE-2025-54253, CVE-2025-54254) with a publicly available proof-of-concept (PoC) exploit. Details about the flaws have been public for days,…
SpyCloud adds AI Insights to Investigations, speeds insider and identity threat detection
SpyCloud has introduced enhancements to its SaaS Investigations solution, integrating advanced AI-powered insights that mirror the tradecraft of SpyCloud’s seasoned investigators. Building on the foundation of its IDLink identity analytics, this new capability further automates and accelerates complex cybercrime investigations,…
Trend Micro Apex One flaws exploted in the wild (CVE-2025-54948, CVE-2025-54987)
Unauthenticated command injection vulnerabilities (CVE-2025-54948, CVE-2025-54987) affecting the on-premise version of Trend Micro’s Apex One endpoint security platform are being probed by attackers, the company has warned on Wednesday. Unfortunately for those organizations that use it, a patch is still…
Black Kite launches Adversary Susceptibility Index to expose vendor threat actor risk
Black Kite has unveiled the Adversary Susceptibility Index (ASI), a tool designed for TPRM teams to proactively identify which vendors are most vulnerable to specific threat actors before threats escalate into breaches. “With high-profile threats like Volt Typhoon, Black Basta, and…
New Black Kite tool identifies which vendors are most vulnerable to targeted threat groups
Black Kite has unveiled the Adversary Susceptibility Index (ASI), a tool designed for TPRM teams to proactively identify which vendors are most vulnerable to specific threat actors before threats escalate into breaches. “With high-profile threats like Volt Typhoon, Black Basta, and…
MIND launches autonomous DLP platform to put data protection on autopilot
MIND announced the general availability of the first autonomous DLP platform, enabling security teams to safely use GenAI, go beyond compliance, and automate data protection across all IT environments by reducing manual work and preventing sensitive data leaks. Built from…
Descope enhances AI identity security with Agentic Identity Control Plane
Descope launched Agentic Identity Control Plane, a solution that enables security teams to institute policy-based governance, auditing, and identity management for their AI agent and Model Context Protocol (MCP) ecosystems. The Agentic Identity Control Plane builds on top of the…
Cybersecurity and the development of software-defined vehicles
In many automotive companies, the same systems-engineering teams are responsible for both safety and security. As a result, cybersecurity is treated as a subset of safety, undergirded by an implicit assumption: “If it’s safe, it must be secure.” But that’s…
Sysdig Sage delivers AI-driven remediation and risk prioritization for cloud
Sysdig has unveiled an agentic cloud security platform. With Sysdig’s autonomous AI agents, designed to analyze cloud environments end to end and surface hidden business risks, organizations can remediate threats in minutes and deliver measurable improvements in their security posture.…
Cyware unveils open-source MCP Server to power AI-driven cyber defense
Cyware has released Cyware MCP Server (Model Context Protocol Server) to advance the future of AI-powered cyber defense. The new open-source capability is purpose-built to enable generative AI-native workflows, allowing seamless integration between Cyware’s threat intelligence; security automation platforms and…
Forter launches Identity Monitoring to secure agentic commerce
Forter has launched Identity Monitoring for agentic commerce, the first in a series of new capabilities that enable ecommerce enterprises to recognize both bot and human behavior and confidently trust AI agents from discovery through payment. Gartner and other research…
RedSeal launches RedSeal One to simplify exposure management across hybrid environments
RedSeal unveiled RedSeal One, an AI-enabled exposure management platform designed to help organizations reduce risk, streamline operations, and strengthen resilience across hybrid environments. RedSeal One combines the company’s four foundational capabilities—hybrid environment modeling, attack path analysis, business-contextual risk prioritization, and…
HPE unveils unified cybersecurity portfolio with AI-driven networking and data protection
HPE announced expansion of its cybersecurity, resiliency, and compliance solutions, taking a multi-layered approach to protect enterprises through industry-leading data, network, and system security. HPE is introducing its combined secure networking portfolio, built on HPE Aruba Networking and HPE Juniper…
TP-Link TL-WR3602BE secures travel Wi-Fi with built-in VPNs and Wi-Fi 7 speed
TP-Link has released the TL-WR3602BE, a high-performance Wi-Fi 7 travel router delivering speeds up to 3.6 Gbps. It features built-in VPN apps and multiple operating modes, making it a versatile choice for travel connectivity. Designed for digital nomads, business travelers,…
ArmorCode enhances ASPM platform to address AI-generated code threats and CRA compliance
ArmorCode announced application security and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA). As enterprises adopt AI-generated code, security teams struggle with…
Concentric AI enhances data security with new platform integrations
Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with Wiz, gives Wiz customers unique contextual insights into their cloud data…
Searchlight Cyber unveils AI Agent to automate dark web threat actor summaries
Searchlight Cyber has released a new AI capability that summarizes the activity of a threat actor in its dark web investigation platform, Cerberus. The Searchlight AI Agent uses the Cerberus’ dark web data lake to provide a quick overview of…
Ransomware is up, zero-days are booming, and your IP camera might be next
Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging 20 per day. Based on an…
AI in the SOC: Game-changer or more noise?
In this Help Net Security video, Kev Marriott, Senior Manager of Cyber at Immersive Labs, explores the challenges and opportunities of integrating AI into Security Operations Centers (SOCs). While AI can boost productivity by automating manual tasks and reducing alert…
Why 90% of cyber leaders are feeling the heat
90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of AI and expanding attack surfaces, according to BitSight. These threats are also fueling high rates of burnout, with 47% of…
CISOs say they’re prepared, their data says otherwise
Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius report, based on a survey of 500…
Millions of Dell laptops could be persistently backdoored in ReVault attacks
A set of firmware vulnerabilities affecting 100+ Dell laptop models widely used in government settings and by the cybersecurity industry could allow attackers to achieve persistent access even across Windows reinstalls, Cisco Talos researchers have discovered. About the vulnerabilities Most…
ExtraHop helps SOCs connect the dots with identity-driven detection
ExtraHop unveiled new innovations to accelerate incident response, offering an understanding of cyberattacks by linking disparate detections to compromised identities. As threat actors increasingly weaponize user identities to carry out their attacks, exploiting identity directory services like Active Directory and…
Project Ire: Microsoft’s autonomous malware detection AI agent
Microsoft is working on a AI agent whose main goal is autonomous malware detection and the prototype – dubbed Project Ire – is showing great potential, the company has announced on Tuesday. Tested on a dataset of known malicious and…
Riverbed rolls out AI-powered tools to find and fix network issues faster
Riverbed launched its new AI-powered intelligent network observability solutions, enhancing network visibility for enterprise IT teams and enabling them to proactively identify and resolve problems in real-time before they escalate into business challenges. The new solutions will deliver even greater…
Manifest AI Risk turns weeks of model vetting into two clicks
Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance teams secure their AI supply chains. The Manifest Platform is already used by Fortune 500 companies and critical government agencies.…
Cymulate’s new platform turns threat validation into smarter defense
Cymulate announced the new Cymulate Exposure Management Platform, which validates, prioritizes and optimizes the entire security ecosystem – continuously. The new Cymulate platform unifies exposure data and integrates threat validation results to accelerate existing SecOps, detection engineering and exposure management…
New Reveal platform shines a light on post-login identity behavior
Reveal Security released the Reveal Platform, a solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed for modern hybrid enterprises, the platform provides end-to-end visibility into both human and non-human identity behaviors. “Credentials are compromised all…
Security tooling pitfalls for small teams: Cost, complexity, and low ROI
In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and automation are key for SMBs with…
BloodHound 8.0 debuts with major upgrades in attack path management
SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advancement in identity attack path management that uncovers attack paths…
Ransomware groups shift to quadruple extortion to maximize pressure
Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware extortion tactics (Source: Akamai) The emerging trend of quadruple extortion includes using DDoS attacks to disrupt…
Back to basics webinar: The ecosystem of CIS Security best practices
Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all require the same security response: come together as a community to prioritize the basics. Watch this on-demand webinar to understand…
Your employees uploaded over a gig of files to GenAI tools last quarter
In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings confirm that sensitive data is being exposed through GenAI tools, something many security leaders fear…
Cybersecurity jobs available right now: August 5, 2025
CW – OT Security Officer SSE | United Kingdom | On-site – View job details As a CW – OT Security Officer, you will lead and prioritise a programme of security audits and assurance to identify vulnerabilities within existing controls.…
LastPass unveils SaaS Protect to clamp down on shadow IT, AI risks
Building on the company’s existing SaaS Monitoring capabilities, LastPass SaaS Protect introduces a set of policy enforcements that enable organizations to move from passive visibility into proactive access control. Business benefits include: Real-time SaaS governance: Quickly restrict access to unsanctioned…
Cyera launches AI Guardian to secure all types of AI systems
Cyera launched AI Guardian, a solution built to secure any type of AI. It expands Cyera’s platform to meet the needs of enterprises adopting AI at scale, anchored by two core products: AI-SPM, providing inventory on all AI assets at…
CyberSaint’s new AI tool tells you which threats matter
CyberSaint launched AI-Powered Findings Management within the CyberStrong platform. This new feature, powered by the company’s proprietary CyberSaint AI engine, transforms how CISOs and team prioritize threats by dynamically ingesting security telemetry, emerging threats, cyber loss data and a customer’s…
SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025. “In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through…
Average global data breach cost now $4.44 million
IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations experiencing an AI-related breach is a small representation of the researched population, this is…
AIBOMs are the new SBOMs: The missing link in AI risk management
In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains how AI Bills…
Open-source password recovery utility Hashcat 7.0.0 released
Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features for distributed password…
What’s keeping risk leaders up at night? AI, tariffs, and cost cuts
Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according to a new report from Gartner. The firm’s second-quarter Emerging Risk Report, based on a survey of 223 senior risk,…
The surprising truth about identity security confidence
Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The study reveals a troubling gap between what organizations believe about their identity security programs and how they actually behave. Surprisingly,…
Week in review: Food sector cybersecurity risks, cyber threats to space infrastructure
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that…
Smart steps to keep your AI future-ready
In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong governance from day one. As AI becomes more embedded in business ecosystems, overlooking agent-level…
It’s time to sound the alarm on water sector cybersecurity
A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean water supply can have serious public health and safety consequences, and threat actors know the damage they can cause. Water…
Review: CISA Certified Information Systems Auditor Practice Tests
CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering key objectives and real-world systems audit skills. About the authors Peter H. Gregory is a best-selling cybersecurity author, educator, keynote…
What attackers know about your company thanks to AI
In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key areas: how GenAI lowers the technical barrier for attackers, enables highly convincing…
Security gaps still haunt shared mobile device use in healthcare
Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still struggling to manage the security risks that come with them, according to Imprivata’s 2025 State of…
Infosec products of the month: July 2025
Here’s a look at the most interesting products from the past month, featuring releases from: Akeyless, At-Bay, Barracuda Networks, Bitdefender, Cynomi, Darwinium, DigitalOcean, Immersive, Lepide, Malwarebytes, ManageEngine, NETSCOUT, PlexTrac, Scamnetic, Seemplicity, Socure, StealthCores, Stellar Cyber, Tosibox, Tracer AI, and Zenni…
GreyNoise enhances threat response with real-time blocklists, feeds, and SOAR integrations
GreyNoise Intelligence introduced three new platform capabilities designed to help security teams detect, block and respond faster to emerging cybersecurity threats. These capabilities, including Real-time Dynamic Blocklists, new GreyNoise feeds and integrations for Security Orchestration, Automation and Response (SOAR), empower…
Outpost24 launches Credential Checker to spot leaked credentials on the dark web
Outpost24 has launched the Outpost24 Credential Checker, a free tool that provides organizations with a sneak peek into exposed credentials leaked on the dark web. Timely visibility into credential exposure can mean the difference between a contained incident and a…
Intel 471 unveils Verity471, a unified platform for next-gen cyber threat intelligence
Intel 471 has launched Verity471, a next-generation cyber threat intelligence (CTI) platform. It brings together all of Intel 471’s solutions into one place, making it easier for security teams to work together, improve workflows, and get more from their threat…
Singulr introduces AI control plane to replace fragmented tools with unified, automated governance
Singulr AI launched the unified AI control plane, a platform that empowers IT, security, and compliance leaders to scale AI adoption without compromising trust. Underpinning the platform are three key modules: the Singulr Pulse risk intelligence system, application-aware AI red…
Why stolen credentials remain cybercriminals’ tool of choice
It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It…
Citrix delivers new tools for quantum-ready, anywhere work
Citrix has released two new offerings to help enterprises provide secure application access for their entire workforce amid an evolving threat landscape. The first is its post-quantum cryptography (PQC) solution for NetScaler which addresses the emerging threat that quantum computing…
New AI model offers faster, greener way for vulnerability detection
A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much larger systems. The model’s release comes at a time when developers and security teams face mounting pressure to secure complex…
Palo Alto Networks to acquire CyberArk in $25 billion deal
Palo Alto Networks and CyberArk announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the agreement, CyberArk shareholders will receive $45.00 in cash and 2.2005 shares of Palo…
AI is changing the vCISO game
Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and…
Secrets are leaking everywhere, and bots are to blame
Secrets like API keys, tokens, and credentials are scattered across messaging apps, spreadsheets, CI/CD logs, and even support tickets. According to Entro Security’s NHI & Secrets Risk Report H1 2025, non-human identities (NHIs), including bots, service accounts, and automation tools,…
Why rural hospitals are losing the cybersecurity battle
Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. Often, they are…
Artemis: Open-source modular vulnerability scanner
Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most important feature of the tool is report…
Why CISOs should rethink identity risk through attack paths
Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA…
The food supply chain has a cybersecurity problem
It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity…
Boards shift focus to tech and navigate cautious investors
Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer shareholder proposals (especially on sustainability),…
AI is here, security still isn’t
Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to detect…
Fighting AI with AI: How Darwinium is reshaping fraud defense
AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered features,…
Darwinium launches AI tools to detect and disrupt adversarial threats
Just ahead of Black Hat USA 2025, Darwinium has announced the launched Beagle and Copilot, two new agentic AI features that simulate adversarial attacks, surface hidden vulnerabilities, and dynamically optimize fraud defenses. As fraudsters increasingly deploy AI agents to evade…
Beyond Passwords: A Guide to Advanced Enterprise Security Protection
Credentials, not firewalls, are now the front line of enterprise security. Attackers are bypassing traditional defenses using stolen passwords, infostealer malware, and MFA fatigue tactics. Enzoic’s Beyond Passwords guide shows how to shift to identity-first protection with real-time credential monitoring,…
Intruder launches GregAI to deliver AI-powered, contextual security workflow management
Intruder has launched GregAI, an AI-powered security analyst that offers comprehensive visibility into users’ security infrastructure, now available in beta. Unlike generic AI assistants, GregAI integrates directly with data from Intruder’s exposure management platform, delivering contextual security intelligence to help…
Cyware expands Intelligence Suite to streamline CTI program deployment and operations
Cyware expanded its Cyware Intelligence Suite, an enhanced threat intelligence program-in-a-box that consolidates threat management capabilities into a streamlined, logical workflow. The expansion enables security teams to operationalize threat intelligence more easily and improve security posture faster. The Cyware Intelligence…
Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance. Databases are the backbone of the global economy and…
Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis
Booz Allen Hamilton announced Vellox Reverser, an AI-enabled cloud product that protects organizations from malware as cyberattacks grow increasingly insidious. The service uses a network of peer-to-peer nodes that collaboratively deconstruct complex malware binaries and produce actionable defensive recommendations in…
Why behavioral intelligence is becoming the bank fraud team’s best friend
In this Help Net Security interview, Seth Ruden, Senior Director of Global Advisory at BioCatch, discusses how financial institutions are addressing fraud. He explains how banks are using behavioral biometrics, device fingerprinting, and network intelligence to enhance fraud prevention. Ruden…
Ransomware will thrive until we change our strategy
We have reached a stage where ransomware isn’t simply a cybercrime issue: it is now clearly a business disruptor, a threat to societal trust, and increasingly, a national security crisis. As James Babbage, Director General (Threats) at the UK’s National…
The final frontier of cybersecurity is now in space
As the space sector becomes more commercial and military-focused, these assets are becoming attractive targets. The global space economy is booming and is expected to increase from $630 billion in 2023 to $1.8 trillion by 2035. This means the need…
Inside the application security crisis no one wants to talk about
Despite knowing the risks, most organizations are still shipping insecure software. That’s one of the stark findings from Cypress Data Defense’s 2025 State of Application Security report, which reveals a worsening crisis in software security. According to the report, 62%…
Cybersecurity jobs available right now: July 29, 2025
Cyber Incident Responder Accenture | Ireland | Hybrid – View job details As a Cyber Incident Responder, you will identify and investigate intrusions to determine the cause and extent of the breach, by leveraging EDR, SIEM, and threat intelligence sources.…
Your supply chain security strategy might be missing the biggest risk
Third-party involvement in data breaches has doubled this year from 15 percent to nearly 30 percent. In response, many organizations have sharpened their focus on third-party risk management, carefully vetting the security practices of their vendors. However, a critical gap…
The legal minefield of hacking back
In this Help Net Security interview, Gonçalo Magalhães, Head of Security at Immunefi, discusses the legal and ethical implications of hacking back in cross-border cyber incidents. He warns that offensive cyber actions risk violating international law, escalating conflicts, and harming…
Review: LLM Engineer’s Handbook
For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that gap. About the authors Paul Iusztin is a Senior AI Engineer and founder of Decoding ML, a channel for…
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from user input to server output. This helps it spot complex, multi-step vulnerabilities that traditional…
How to fight document fraud with the latest tech tools
In this Help Net Security video, Thomas Berndorfer, CEO of Connecting Software, explores cutting-edge technologies designed to detect and prevent document forgery and digital fraud. He presents four key approaches to verifying document authenticity: IDVT, PKI, AI-based methods, and blockchain,…
Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft pins on-prem SharePoint attacks on Chinese threat actors As Microsoft continues to update its customer guidance for protecting on-prem SharePoint servers against the latest…
What 50 companies got wrong about cloud identity security
Most organizations still miss basic identity security controls in the cloud, leaving them exposed to breaches, audit failures, and compliance violations. A new midyear benchmark from Unosecur found that nearly every company scanned had at least one high-risk issue, with…
Digital sovereignty becomes a matter of resilience for Europe
In this Help Net Security interview, Benjamin Schilz, CEO of Wire, discusses Europe’s push for digital sovereignty through initiatives like Gaia-X and the EU AI Act. As the continent redefines its technological future, the focus shifts from regulation to building…
New infosec products of the week: July 25, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Akeyless, Bitdefender, Malwarebytes, ManageEngine, PlexTrac, and Seemplicity. PlexTrac Workflow Automation Engine enhancements accelerate time to remediation PlexTrac launched enhanced Workflow Automation Engine, a major product…
Six months into DORA, most financial firms are still not ready
It’s been six months since the EU’s Digital Operational Resilience Act (DORA) came into effect, but a new Censuswide survey shows that nearly all financial services organizations in EMEA still feel unprepared. An overwhelming 96% of respondents said their current…