The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal prosecutors in Brooklyn have charged Chen Zhi, also known as “Vincent,”…
Tag: Help Net Security
Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots
Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow data. This new capability addresses critical challenges facing security operations (SOC) teams by delivering visibility across AWS Virtual Private Cloud…
A safer way to break industrial systems (on purpose)
Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a way to make that easier. Their work introduces a container-based framework that lets researchers and practitioners…
New Jscrambler AI Assistant accelerates PCI DSS compliance decisions
Jscrambler announced the AI Assistant for PCI DSS script authorization workflows, which delivers context-rich insights and expert recommendations to enable prompt and confident script authorization decisions and justifications. PCI DSS v4 requirements 6.4.3 and 11.6.1 mandate the inventorying, authorizing, and…
Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks
Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams to detect, triage, and take down brand and executive threats across social media and the open, deep, and dark web.…
Maltrail: Open-source malicious traffic detection system
Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists, as well as static lists compiled from antivirus reports and user-defined sources. These “trails” can include…
Building trust in AI-powered security operations
In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability to process vast amounts of data and detect anomalies faster than…
The power grid is getting old, and so is the cybersecurity protecting it
Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, water, and transport are reaching the end of their design life.…
The diagnosis is in: Mobile health apps are bad for your privacy
Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components. Study design showing data collection, static security analysis (MobSF, RiskInDroid, OWASP),…
LevelBlue acquires Cybereason to expand global MDR, XDR, and threat response leadership
LevelBlue has signed a definitive agreement to acquire Cybereason, a cybersecurity firm known for its Extended Detection and Response (XDR) platform, threat intelligence team, and digital forensics and incident response (DFIR) capabilities. For clients and strategic partners, the acquisition delivers…
Picus Security uses AI to turn threat intelligence into attack simulations
Picus Security launched new AI-powered breach and attack simulation (BAS) capabilities within the Picus Security Validation Platform. This introduces a new level of speed and intelligence, enabling security teams to create and simulate complex attack scenarios, validate the effectiveness of…
Regula simplifies identity verification with its new all-in-one IDV Platform
Regula has launched its Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a single, unified workflow. Built to scale according to an organization’s growth pace and fully vendor-agnostic, the platform…
NetApp strengthens its enterprise data platform with new AI-focused innovations
NetApp unveiled new products, strengthening its enterprise-grade data platform for AI innovation. The new NetApp AFX decouples performance and capacity with a disaggregated NetApp ONTAP that runs on the new NetApp AFX 1K storage system. NetApp AI Data Engine is…
Visa’s Trusted Agent Protocol sets new standard for secure agentic transactions
Visa unveiled the Trusted Agent Protocol, establishing a foundational framework for agentic commerce that enables secure communication between AI agents and merchants during every step of a transaction. The Trusted Agent Protocol aims to address the challenges facing agent-driven commerce,…
What if your privacy tools could learn as they go?
A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how data is distributed, even when that information is incomplete. The method allows privacy guarantees to stay mathematically sound while improving…
The solar power boom opened a backdoor for cybercriminals
Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in the transition. Cyber threats expose weak spots in solar power systems Until recently, security risks in…
Cybersecurity jobs available right now: October 14, 2025
Cyber Security Analyst I First Citizens Bank | USA | Remote – View job details As a Cyber Security Analyst, you will be responsible for developing skills related to the use of the standard intelligence cycle (collection, analysis, and dissemination)…
What Chat Control means for your privacy
The EU’s proposed Chat Control (CSAM Regulation) aims to combat child sexual abuse material by requiring digital platforms to detect, report, and remove illegal content, including grooming behaviors. Cybersecurity experts warn that such measures could undermine encryption, create new attack…
Security validation: The key to maximizing ROI from security investments
Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern enterprise’s cyber defenses. Yet despite these significant investments, attackers continue to exploit misconfigurations, untested rules, and hidden dependencies that slip…
Lattice MachXO5-NX TDQ prepare organizations for quantum-era security threats
Lattice Semiconductor introduced the Lattice MachXO5-NX TDQ family, a secure control FPGAs with full Commercial National Security Algorithm (CNSA) 2.0-compliant post-quantum cryptography (PQC) support. Built on the Lattice Nexus platform, MachXO5-NX TDQ FPGAs deliver security, reliability, and flexibility for Computing,…