When a new vulnerability hits the news, security teams often scramble to find out if they are at risk. The process of answering that question can take days or weeks, involving manual research, rule-writing, and testing. Google Security Operations wants…
Tag: Help Net Security
Commvault Cloud Unity platform delivers unified data security, recovery, and identity protection
Commvault has announced the Commvault Cloud Unity platform release. This next-generation, AI-enabled version of Commvault Cloud now unifies data security, cyber recovery, and identity resilience across cloud, SaaS, on-premises, and hybrid environments. Today security and IT teams are grappling with…
Securonix DPM Flex optimizes SIEM data management
Securonix announced of Data Pipeline Manager (DPM) with DPM Flex Consumption, a breakthrough in integrated SIEM data management that expands threat visibility, increases analytical coverage, and improves compliance assurance, all within the same platform and budget. For years, cost constraints…
UK’s new Cyber Security and Resilience Bill targets weak links in critical services
The UK government has introduced the Cyber Security and Resilience Bill, a major piece of legislation designed to boost the country’s protection against cyber threats. The new law aims to strengthen the digital defenses of essential public services and update…
Cyware enhances cyber defense with AI Fabric merging generative and agentic AI
Cyware has announced the launch of a new Cyware Quarterback AI solution delivering an AI Fabric to address security use cases. Cyware Quarterback AI was initially launched as a Co-pilot chat assistant in March 2024. Since that first release the…
Stellar Cyber 6.2 strengthens human-augmented autonomous SOC
Stellar Cyber announced version 6.2, marking the next major milestone in its mission to deliver autonomous security operations. Building on the AI and automation foundations established in versions 6.0 and 6.1, Stellar Cyber 6.2 deepens analyst assistive intelligence, streamlines case…
Black Duck expands SCA with AI Model Risk Insights to deliver visibility into AI model usage
Black Duck revealed that Black Duck SCA can now identify and analyze AI models, starting with the 2025.10.0 release. This capability addresses the need for enterprises to gain visibility into the usage, licensing and data origins of open source AI…
Aryaka advances converged networking and security with Unified SASE as a Service 2.0
Aryaka has announced the launch of Aryaka Unified SASE as a Service 2.0. The new platform incorporates several major new features to accommodate rising AI adoption and the need to secure the hybrid workforce. Aryaka Unified SASE 2.0 ensures that…
IBM pushes toward quantum advantage by 2026 with new Nighthawk processor
IBM is taking another major step toward its goal of achieving quantum advantage by 2026 and fault-tolerant quantum computing by 2029, unveiling its most advanced quantum processor yet, IBM Quantum Nighthawk. IBM Quantum Nighthawk processor The new processor, revealed today,…
Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215)
Microsoft has delivered a rather light load of patches for November 2025 Patch Tuesday: some 60+ vulnerabilities have received a fix, among them an actively exploited Windows Kernel flaw (CVE-2025-62215). CVE-2025-62215 CVE-2025-62215 is a memory corruption issue that stems from…
Avast delivers AI-powered protection for Android and iOS
Avast launched Scam Guardian and Scam Guardian Pro for mobile devices. Building on the desktop product, this mobile expansion brings in AI-powered scam protection directly to people’s smartphones and tablets. Scam Guardian is available at no cost with Avast Mobile…
When every day is threat assessment day
In this Help Net Security interview, Paul J. Mocarski, VP & CISO at Sammons Financial Group, discusses how insurance carriers are adapting their cybersecurity strategies. He explains how ongoing threat assessments, AI-driven automation, and third-party risk management help maintain readiness.…
ProxyBridge: Open-source proxy routing for Windows applications
ProxyBridge is a lightweight, open-source tool that lets Windows users route network traffic from specific applications through SOCKS5 or HTTP proxies. It can redirect both TCP and UDP traffic and gives users the option to route, block, or allow connections…
Autonomous AI could challenge how we define criminal behavior
Whether we ever build AI that thinks like a person is still uncertain. What seems more realistic is a future with more independent machines. These systems already work across many industries and digital environments. Alongside human-to-human and human-to-machine contact, communication…
AI is forcing boards to rethink how they govern security
Boards are spending more time on cybersecurity but still struggle to show how investments improve business performance. The focus has shifted from whether to fund protection to how to measure its return and ensure it supports growth. AI, automation, and…
Shadow AI risk: Navigating the growing threat of ungoverned AI adoption
AI is transforming how businesses operate, but it’s also creating new, often hidden risks. As employees and business units eagerly embrace and experiment with AI solutions, many organizations are losing control over where and how AI is being used. A…
What the latest data reveals about hard drive reliability
What really counts as a hard drive failure? That’s the question at the center of Backblaze’s Q3 2025 Drive Stats report, which tracks the performance of 328,348 hard drives across its global data centers. The latest findings build on more…
CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042)
CISA has added CVE-2025-21042, a vulnerability affecting Samsung mobile devices, to its Known Exploited Vulnerabilities (KEV) catalog, and has ordered US federal civilian agencies to address it by the start of December. “This type of vulnerability is a frequent attack…
Red Hat OpenShift 4.20 unifies enterprise IT, from virtual machines to AI workloads
Red Hat has announced OpenShift 4.20, the latest version of its hybrid cloud application platform built on Kubernetes. Red Hat OpenShift 4.20 introduces capabilities for accelerating AI workloads, strengthening core platform security and enhancing virtualization strategies consistently from the datacenter,…
Action1 addresses Intune gaps with patching and risk-based vulnerability prioritization
Action1 announced new integrations that extend Microsoft Intune with advanced patching and vulnerability management. The enhancements close security and compliance gaps in Intune by adding comprehensive third-party application patching, risk-based vulnerability prioritization, and real-time visibility across Windows, macOS, and Linux.…