Veeam Software announced the availability of Veeam Data Cloud (VDC) for Managed Service Providers (MSPs) through the Veeam Cloud & Service Provider (VCSP) program. Designed to empower third-party service providers, Veeam Data Cloud delivers secure, scalable, and resilient data protection…
Tag: Help Net Security
Cayosoft Guardian Protector safeguards Microsoft 365 and hybrid identity systems
Cayosoft introduced Cayosoft Guardian Protector, a free, always-on solution that delivers real-time threat detection, proactive alerts, resolution guidance, and change history for complex Microsoft hybrid identity environments. Cayosoft Guardian Protector provides administrators and security teams with continuous, real-time visibility and…
When trusted AI connections turn hostile
Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers can quietly take control of hosts, manipulate LLM behavior, and deceive users, all while…
Identifying risky candidates: Practical steps for security leaders
Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can turn into costly problems down the line. Identity verification, credential validation,…
Everyone wants AI, but few are ready to defend it
The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI, many are not ready for the pressure it puts on their…
Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that can be hacked through Bluetooth Their tests show that anyone…
The password problem we keep pretending to fix
Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had faced at least one identity-related breach in recent years, and most…
ImmuniWeb Expands discovery with ASM and Dark web packages
On top of several new free tools launched during the summer, ImmuniWeb released over 500 updates, improvements, new features, and integrations across all our products in Q3, including ImmuniWeb On-Demand, ImmuniWeb MobileSuite, ImmuniWeb Continuous, ImmuniWeb Neuron, ImmuniWeb Neuron Mobile, and…
F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information related to its BIG-IP family of networking and security products, the company confirmed today. BIG-IP vulnerabilities are often leveraged by…
Blumira rolls out SOC Auto-Focus to streamline threat investigation
Blumira launched SOC Auto-Focus, an AI-powered security investigation tool, alongside enhancements to its Managed Service Provider (MSP) partner program. SOC Auto-Focus is designed to help IT teams and MSPs work smarter, reduce alert fatigue and accelerate incident response through contextual…
Harmonic Security targets AI data risks with Model Context Protocol Gateway
Harmonic Security announced Model Context Protocol (MCP) Gateway, a developer-friendly, locally installed gateway that gives security teams complete visibility and control over their organization’s agentic AI ecosystem. The solution intercepts all MCP traffic enabling security teams to discover what clients…
Microsoft patches three zero-days actively exploited by attackers
On October 2025 Patch Tuesday, Microsoft released fixes for 175+ vulnerabilities, including three zero-days under active attack: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827. The actively exploited vulnerabilities are an unusual mix CVE-2025-24990 is in the third-party driver (ltmdm64.sys) for the software-based Agere…
Aura enhancements simplify opt-outs and strengthen online privacy
Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of data broker sites, and identifying…
BigID introduces MCP Server to unlock AI-native access to enterprise data
BigID announced the launch of its Model Context Protocol (MCP) server, designed to unlock AI-native access to enterprise data context across the broadest range of data sources — structured, unstructured, on-prem, cloud, business applications, and AI frameworks. Built on BigID’s…
New Aura features simplify opt-outs and strengthen online privacy
Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of data broker sites, and identifying…
Netcraft launches Phone Scam Disruption to stop brand impersonation calls and texts
Netcraft unveiled a new solution to help protect organizations’ customers from scam texts and phone calls that impersonate their brand. Netcraft’s Phone Scam Disruption automates the detection and takedown of fraudulent phone numbers used in impersonation scam campaigns, shutting down…
New Cranium AI features enhance compliance, security, and agentic AI scalability
Cranium AI released several new agentic AI capabilities and featured releases to its AI Governance and Security Platform. These new products and capabilities are designed to enable enterprises to scale faster with AI agents, streamline compliance and fortify AI systems…
New BarracudaONE features streamline MSP operations and strengthen multi-tenant security
Barracuda Networks unveiled enhancements to its AI-powered BarracudaONE platform. New capabilities, including bulk remediation for email threats, PSA integrations for automated billing and invoicing, and streamlined account management, are purpose-built for managed service providers (MSPs), helping them accelerate security across…
RGS IC Cloud Support enables Kubernetes management in restricted cloud environments
Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments. IC Cloud Support allows organizations working in airgapped or restricted regions of…
Red Hat AI 3 helps enterprises scale AI workloads across hybrid environments
Red Hat released Red Hat AI 3, an evolution of its enterprise AI platform. Bringing together the latest innovations from Red Hat AI Inference Server, Red Hat Enterprise Linux AI (RHEL AI), and Red Hat OpenShift AI, the platform simplifies…