Singulr AI launched the unified AI control plane, a platform that empowers IT, security, and compliance leaders to scale AI adoption without compromising trust. Underpinning the platform are three key modules: the Singulr Pulse risk intelligence system, application-aware AI red…
Tag: Help Net Security
Why stolen credentials remain cybercriminals’ tool of choice
It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It…
Citrix delivers new tools for quantum-ready, anywhere work
Citrix has released two new offerings to help enterprises provide secure application access for their entire workforce amid an evolving threat landscape. The first is its post-quantum cryptography (PQC) solution for NetScaler which addresses the emerging threat that quantum computing…
New AI model offers faster, greener way for vulnerability detection
A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much larger systems. The model’s release comes at a time when developers and security teams face mounting pressure to secure complex…
Palo Alto Networks to acquire CyberArk in $25 billion deal
Palo Alto Networks and CyberArk announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the agreement, CyberArk shareholders will receive $45.00 in cash and 2.2005 shares of Palo…
AI is changing the vCISO game
Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and…
Secrets are leaking everywhere, and bots are to blame
Secrets like API keys, tokens, and credentials are scattered across messaging apps, spreadsheets, CI/CD logs, and even support tickets. According to Entro Security’s NHI & Secrets Risk Report H1 2025, non-human identities (NHIs), including bots, service accounts, and automation tools,…
Why rural hospitals are losing the cybersecurity battle
Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. Often, they are…
Artemis: Open-source modular vulnerability scanner
Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most important feature of the tool is report…
Why CISOs should rethink identity risk through attack paths
Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA…
The food supply chain has a cybersecurity problem
It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity…
Boards shift focus to tech and navigate cautious investors
Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer shareholder proposals (especially on sustainability),…
AI is here, security still isn’t
Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to detect…
Fighting AI with AI: How Darwinium is reshaping fraud defense
AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered features,…
Darwinium launches AI tools to detect and disrupt adversarial threats
Just ahead of Black Hat USA 2025, Darwinium has announced the launched Beagle and Copilot, two new agentic AI features that simulate adversarial attacks, surface hidden vulnerabilities, and dynamically optimize fraud defenses. As fraudsters increasingly deploy AI agents to evade…
Beyond Passwords: A Guide to Advanced Enterprise Security Protection
Credentials, not firewalls, are now the front line of enterprise security. Attackers are bypassing traditional defenses using stolen passwords, infostealer malware, and MFA fatigue tactics. Enzoic’s Beyond Passwords guide shows how to shift to identity-first protection with real-time credential monitoring,…
Intruder launches GregAI to deliver AI-powered, contextual security workflow management
Intruder has launched GregAI, an AI-powered security analyst that offers comprehensive visibility into users’ security infrastructure, now available in beta. Unlike generic AI assistants, GregAI integrates directly with data from Intruder’s exposure management platform, delivering contextual security intelligence to help…
Cyware expands Intelligence Suite to streamline CTI program deployment and operations
Cyware expanded its Cyware Intelligence Suite, an enhanced threat intelligence program-in-a-box that consolidates threat management capabilities into a streamlined, logical workflow. The expansion enables security teams to operationalize threat intelligence more easily and improve security posture faster. The Cyware Intelligence…
Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance. Databases are the backbone of the global economy and…
Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis
Booz Allen Hamilton announced Vellox Reverser, an AI-enabled cloud product that protects organizations from malware as cyberattacks grow increasingly insidious. The service uses a network of peer-to-peer nodes that collaboratively deconstruct complex malware binaries and produce actionable defensive recommendations in…