ArmorCode announced application security and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA). As enterprises adopt AI-generated code, security teams struggle with…
Tag: Help Net Security
Concentric AI enhances data security with new platform integrations
Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with Wiz, gives Wiz customers unique contextual insights into their cloud data…
Searchlight Cyber unveils AI Agent to automate dark web threat actor summaries
Searchlight Cyber has released a new AI capability that summarizes the activity of a threat actor in its dark web investigation platform, Cerberus. The Searchlight AI Agent uses the Cerberus’ dark web data lake to provide a quick overview of…
Ransomware is up, zero-days are booming, and your IP camera might be next
Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging 20 per day. Based on an…
AI in the SOC: Game-changer or more noise?
In this Help Net Security video, Kev Marriott, Senior Manager of Cyber at Immersive Labs, explores the challenges and opportunities of integrating AI into Security Operations Centers (SOCs). While AI can boost productivity by automating manual tasks and reducing alert…
Why 90% of cyber leaders are feeling the heat
90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of AI and expanding attack surfaces, according to BitSight. These threats are also fueling high rates of burnout, with 47% of…
CISOs say they’re prepared, their data says otherwise
Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius report, based on a survey of 500…
Millions of Dell laptops could be persistently backdoored in ReVault attacks
A set of firmware vulnerabilities affecting 100+ Dell laptop models widely used in government settings and by the cybersecurity industry could allow attackers to achieve persistent access even across Windows reinstalls, Cisco Talos researchers have discovered. About the vulnerabilities Most…
Project Ire: Microsoft’s autonomous malware detection AI agent
Microsoft is working on a AI agent whose main goal is autonomous malware detection and the prototype – dubbed Project Ire – is showing great potential, the company has announced on Tuesday. Tested on a dataset of known malicious and…
ExtraHop helps SOCs connect the dots with identity-driven detection
ExtraHop unveiled new innovations to accelerate incident response, offering an understanding of cyberattacks by linking disparate detections to compromised identities. As threat actors increasingly weaponize user identities to carry out their attacks, exploiting identity directory services like Active Directory and…
Riverbed rolls out AI-powered tools to find and fix network issues faster
Riverbed launched its new AI-powered intelligent network observability solutions, enhancing network visibility for enterprise IT teams and enabling them to proactively identify and resolve problems in real-time before they escalate into business challenges. The new solutions will deliver even greater…
Manifest AI Risk turns weeks of model vetting into two clicks
Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance teams secure their AI supply chains. The Manifest Platform is already used by Fortune 500 companies and critical government agencies.…
Cymulate’s new platform turns threat validation into smarter defense
Cymulate announced the new Cymulate Exposure Management Platform, which validates, prioritizes and optimizes the entire security ecosystem – continuously. The new Cymulate platform unifies exposure data and integrates threat validation results to accelerate existing SecOps, detection engineering and exposure management…
New Reveal platform shines a light on post-login identity behavior
Reveal Security released the Reveal Platform, a solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed for modern hybrid enterprises, the platform provides end-to-end visibility into both human and non-human identity behaviors. “Credentials are compromised all…
Security tooling pitfalls for small teams: Cost, complexity, and low ROI
In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and automation are key for SMBs with…
BloodHound 8.0 debuts with major upgrades in attack path management
SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advancement in identity attack path management that uncovers attack paths…
Ransomware groups shift to quadruple extortion to maximize pressure
Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware extortion tactics (Source: Akamai) The emerging trend of quadruple extortion includes using DDoS attacks to disrupt…
Back to basics webinar: The ecosystem of CIS Security best practices
Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all require the same security response: come together as a community to prioritize the basics. Watch this on-demand webinar to understand…
Your employees uploaded over a gig of files to GenAI tools last quarter
In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings confirm that sensitive data is being exposed through GenAI tools, something many security leaders fear…
Cybersecurity jobs available right now: August 5, 2025
CW – OT Security Officer SSE | United Kingdom | On-site – View job details As a CW – OT Security Officer, you will lead and prioritise a programme of security audits and assurance to identify vulnerabilities within existing controls.…