You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht…
Tag: Help Net Security
Why organizations need a new approach to risk management
To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business leaders don’t just identify and manage risks after they occur, but instinctively…
The state of DMARC adoption: What 10M domains reveal
In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email spoofing,…
AI is everywhere, but scaling it is another story
AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas executives need…
How attackers weaponize communications networks
In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations range from corporate espionage to…
Coro 3.6 reduces operational burden for resource-constrained SMBs
Coro announced the latest version of its platform. Coro 3.6 leverages AI to transform complex security into easy-to-use security for resource-constrained SMBs. Today, SMBs require a solution to enhance their security posture. Coro’s unified platform ensures that everything works together…
Lookout’s AI-powered solution combats SMS phishing attacks
Lookout introduces Smishing AI, an AI-powered solution designed to protect enterprises from the growing threat of SMS phishing (smishing) attacks. SMS phishing, commonly called “smishing,” is a cyberattack where fraudsters send misleading text messages to trick people into giving up…
Microsoft, Adobe, SAP deliver critical fixes for September 2025 Patch Tuesday
On September 2025 Patch Tuesday, Microsoft has released patches for 80+ vulnerabilities in its various software products, but the good news is that none of them are actively exploited. Among the critical and important vulnerabilities patched by Microsoft this time…
Automated network pentesting uncovers what traditional tests missed
Most organizations run an annual network penetration test, remediate the issues it uncovers, and move on. But attackers are probing networks every day, using publicly available tools to exploit common misconfigurations and overlooked vulnerabilities. A new report, based on over…
Xage Fabric prevents unauthorized access and sensitive data exposure
Xage Security has released zero trust platform designed to secure AI environments. Built on the same proven zero trust principles Xage uses to protect critical infrastructure, the platform delivers control over AI data access, tool usage, and multi-agent workflows, eliminating…
Perforce expands DevOps Data Platform with AI-driven synthetic data generation
Perforce Software has expanded its software testing and synthetic data offerings with the introduction of AI-powered synthetic data generation. Delphix AI introduces a new language model embedded into the Delphix DevOps Data Platform, allowing teams to automatically deliver synthetic data…
Gigamon Insights delivers agentic AI for threat detection, compliance, and root-cause analysis
Gigamon has released Gigamon Insights, an agentic AI application purpose-built for network-derived telemetry that will deliver instant guidance for security and IT operations teams. Launching with integrations into SIEM and observability platforms from Elastic and Splunk and cloud services from…
DataLocker boosts data security with DL GO and MySafeConsole
DataLocker introduces DL GO, a secure and easy-to-use encrypted USB flash drive, alongside MySafeConsole, a lightweight cloud console that gives individuals and small teams centralized control, without enterprise cost. DL GO safeguards data with AES-256 XTS (FIPS 197) hardware encryption…
Garak: Open-source LLM vulnerability scanner
LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and toxic…
Deepfakes are rewriting the rules of geopolitics
Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate…
Fixing silent failures in security controls with adversarial exposure validation
Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, endpoints are protected, and SIEM rules are running. All good, right? Not so fast. Appearances can be deceiving.…
CISOs, stop chasing vulnerabilities and start managing human risk
Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than technical flaws. The survey…
AI agents are here, now comes the hard part for CISOs
AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that 52% of…
Plex tells users to change passwords due to data breach, pushes server owners to upgrade
Media streaming company Plex has suffered a data breach and is urging users to reset their account password and enable two-factor authentication. “An unauthorized third party accessed a limited subset of customer data from one of our databases. While we…
Hummingbird’s compliance and risk platform helps financial institutions manage risk
Hummingbird announced its unified platform for risk and compliance operations. The expanded platform brings together the full risk and compliance lifecycle with the launch of new solutions for both Transaction & Risk Monitoring and Customer Screening. Financial institutions, long stymied…