Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that…
Tag: Help Net Security
Smart steps to keep your AI future-ready
In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong governance from day one. As AI becomes more embedded in business ecosystems, overlooking agent-level…
It’s time to sound the alarm on water sector cybersecurity
A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean water supply can have serious public health and safety consequences, and threat actors know the damage they can cause. Water…
Review: CISA Certified Information Systems Auditor Practice Tests
CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering key objectives and real-world systems audit skills. About the authors Peter H. Gregory is a best-selling cybersecurity author, educator, keynote…
What attackers know about your company thanks to AI
In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key areas: how GenAI lowers the technical barrier for attackers, enables highly convincing…
Security gaps still haunt shared mobile device use in healthcare
Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still struggling to manage the security risks that come with them, according to Imprivata’s 2025 State of…
Infosec products of the month: July 2025
Here’s a look at the most interesting products from the past month, featuring releases from: Akeyless, At-Bay, Barracuda Networks, Bitdefender, Cynomi, Darwinium, DigitalOcean, Immersive, Lepide, Malwarebytes, ManageEngine, NETSCOUT, PlexTrac, Scamnetic, Seemplicity, Socure, StealthCores, Stellar Cyber, Tosibox, Tracer AI, and Zenni…
GreyNoise enhances threat response with real-time blocklists, feeds, and SOAR integrations
GreyNoise Intelligence introduced three new platform capabilities designed to help security teams detect, block and respond faster to emerging cybersecurity threats. These capabilities, including Real-time Dynamic Blocklists, new GreyNoise feeds and integrations for Security Orchestration, Automation and Response (SOAR), empower…
Outpost24 launches Credential Checker to spot leaked credentials on the dark web
Outpost24 has launched the Outpost24 Credential Checker, a free tool that provides organizations with a sneak peek into exposed credentials leaked on the dark web. Timely visibility into credential exposure can mean the difference between a contained incident and a…
Intel 471 unveils Verity471, a unified platform for next-gen cyber threat intelligence
Intel 471 has launched Verity471, a next-generation cyber threat intelligence (CTI) platform. It brings together all of Intel 471’s solutions into one place, making it easier for security teams to work together, improve workflows, and get more from their threat…
Singulr introduces AI control plane to replace fragmented tools with unified, automated governance
Singulr AI launched the unified AI control plane, a platform that empowers IT, security, and compliance leaders to scale AI adoption without compromising trust. Underpinning the platform are three key modules: the Singulr Pulse risk intelligence system, application-aware AI red…
Why stolen credentials remain cybercriminals’ tool of choice
It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It…
Citrix delivers new tools for quantum-ready, anywhere work
Citrix has released two new offerings to help enterprises provide secure application access for their entire workforce amid an evolving threat landscape. The first is its post-quantum cryptography (PQC) solution for NetScaler which addresses the emerging threat that quantum computing…
New AI model offers faster, greener way for vulnerability detection
A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much larger systems. The model’s release comes at a time when developers and security teams face mounting pressure to secure complex…
Palo Alto Networks to acquire CyberArk in $25 billion deal
Palo Alto Networks and CyberArk announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the agreement, CyberArk shareholders will receive $45.00 in cash and 2.2005 shares of Palo…
AI is changing the vCISO game
Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and…
Secrets are leaking everywhere, and bots are to blame
Secrets like API keys, tokens, and credentials are scattered across messaging apps, spreadsheets, CI/CD logs, and even support tickets. According to Entro Security’s NHI & Secrets Risk Report H1 2025, non-human identities (NHIs), including bots, service accounts, and automation tools,…
Why rural hospitals are losing the cybersecurity battle
Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. Often, they are…
Artemis: Open-source modular vulnerability scanner
Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most important feature of the tool is report…
Why CISOs should rethink identity risk through attack paths
Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA…