Security leaders are staring down a year of major change. In its Cybersecurity Forecast 2026, Google paints a picture of a threat landscape transformed by AI, supercharged cybercrime, and increasingly aggressive nation-state operations. Attackers are moving faster, scaling their operations…
Tag: Help Net Security
Delinea Platform now available to IBM customers through expanded partnership
Delinea has announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers. This new agreement deepens a strategic collaboration that began between the two companies in 2018. The Delinea Platform delivers…
Cybercriminals exploit RMM tools to steal real-world cargo
Cybercriminals are compromising logistics and trucking companies by tricking them into installing remote monitoring and management (RMM) tools, Proofpoint researchers warned. The attackers’ end goal is to hijack freight shipments and sell the stolen goods. How the attack unfolds Since…
DefectDojo unveils Sensei, an AI-powered cybersecurity consultant
DefectDojo has announced DefectDojo Sensei, an AI agent designed to serve as the ultimate cybersecurity consultant. Sensei is the first super-intelligent agent of its kind in cybersecurity, leveraging self-training evolution algorithms to deliver groundbreaking performance while remaining self-contained to eliminate…
CyberArk launches Secure AI Agents to safeguard privileged AI identities
CyberArk is announcing the general availability of the CyberArk Secure AI Agents Solution, expanding the CyberArk Identity Security Platform with privilege controls to secure the rapidly growing class of AI agent identities. As organizations adopt AI agents to automate tasks…
Forescout eyeSentry platform delivers continuous, cloud-based exposure management
Forescout has announced the launch of eyeSentry, a cloud-native exposure management solution that redefines how enterprises identify and mitigate hidden risks across IT, IoT, and IoMT environments. As hybrid and cloud environments expand, vulnerability management, static scans and point-in-time assessments,…
Bugcrowd expands AI-powered, human-led security with Mayhem Security acquisition
Bugcrowd has announced the acquisition of Mayhem Security to advance the next generation of AI-powered, human-in-the-loop security testing. Bugcrowd aims to help organizations ship safer software faster, at lower cost, and with greater confidence, while shrinking their attack surface. The…
Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
A ransomware negotiator and an incident response manager have been indicted in Florida for allegedly conspiring to deploy the ALPHV/BlackCat ransomware against multiple US companies and extorting nearly $1.3 million from one of the victims. According to a federal grand…
European authorities dismantle €600 million crypto scam network
Nine people have been arrested in a coordinated international operation targeting a large cryptocurrency money laundering network that defrauded victims of more than €600 million. The operation was led by Eurojust, the EU’s judicial cooperation agency, which brought together investigators…
New Cisco solutions bring speed, security, and automation to distributed AI networks
Cisco is introducing innovations to modernize campus, branch, and industrial networks to support the growing use of AI. Its solutions simplify operations, scale with evolving business needs, and enhance security, all of which are critical to unlocking the full potential…
Graylog’s AI features improve security outcomes across hybrid environments
Graylog launched its Graylog Security Fall 2025 release. The latest version introduces AI-driven insights, Model Context Protocol (MCP) Server Access, and Amazon Security Data Lake integration, enabling SOCs to operate with clarity, speed, and cost efficiency. The new platform (version…
Zscaler acquires SPLX to help organizations secure their AI investments
Zscaler has acquired AI security pioneer SPLX, extending the Zscaler Zero Trust Exchange platform with shift-left AI asset discovery, automated red teaming, and governance, so organizations can secure their AI investments from development through deployment. “Today marks an important step…
How nations build and defend their cyberspace capabilities
In this Help Net Security interview, Dr. Bernhards Blumbergs, Lead Cyber Security Expert at CERT.LV, discusses how cyberspace has become an integral part of national and military operations. He explains how countries develop capabilities to act and defend in this…
Cybercriminals have built a business on YouTube’s blind spots
The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a space where entertainment, information, and deception coexist. Alongside everyday videos, the site has seen…
Uncovering the risks of unmanaged identities
Every organization manages thousands of identities, from admins and developers to service accounts and AI agents. But many of these identities operate in the shadows, untracked and unprotected. These unmanaged identities quietly expand your attack surface, weaken compliance, and threaten…
Cisco’s platform enhancements strengthen security for MSPs
Cisco announced a significant platform advancement designed to empower MSPs to deliver security services. This innovation adds foundational multi-customer management capabilities within Security Cloud Control, Cisco’s unified, AI-powered management platform. This console leverages advanced AIOps and AgenticOps to enable organizations…
Deepfakes, fraud, and the fight for trust online
In this Help Net Security video, Michael Engle, Chief Strategy Officer at 1Kosmos, explains how deepfakes are changing online identity verification. He describes how fake IDs and synthetic identities are being used for account signups and takeovers. Engle outlines why…
Cybersecurity jobs available right now: November 4, 2025
Cybersecurity Architect Alstom | France | On-site – View job details As a Cybersecurity Architect, you will analyze solutions, identify associated risks, and propose security architecture models by involving various cybersecurity experts (network, IAM, SIEM, SOC, etc.) and applying the…
Financial services can’t shake security debt
In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones linger longer, creating a kind of software “interest” that keeps growing, according to Veracode’s 2025 State of Software Security report.…
Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
The volume of threat intelligence data has grown exponentially, but the ability to interpret and act on it has not. Every day brings new CVE disclosures, exploit releases, and vendor advisories, Teams are buried under overlapping feeds, inconsistent formats, and…