Palo Alto Networks announced Prisma AIRS, an AI security platform that serves as the cornerstone for AI protection, designed to protect the entire enterprise AI ecosystem – AI apps, agents, models, and data – at every step. Building upon the…
Tag: Help Net Security
ArmorCode Anya accelerates critical security decisions
ArmorCode launched Anya, an agentic AI champion purpose-built for AppSec and product security teams. Following a successful early access program, Anya is now available to all ArmorCode enterprise customers, delivering intelligent, conversation-driven security insights that close the expertise gap and…
Censys enables security teams to be more proactive in their threat hunting
Censys is launching a new solution specifically designed to enable threat hunting teams to track adversary infrastructure. The Censys’ Threat Hunting solution is part of Censys’ recently released Internet Intelligence platform, which provides security teams across the enterprise with the…
Trend Micro helps organizations secure AI-driven workloads
Trend Micro announced new AI-powered threat detection capabilities designed specifically for enterprises embracing AI at scale. This effort brings together Trend’s security expertise with NVIDIA accelerated computing and NVIDIA AI Enterprise software, leveraging AWS infrastructure to support scalable, enterprise-ready deployment.…
Netskope One enhancements cover a broad range of AI security use cases
Netskope announced expansion of the Netskope One platform to cover more AI security use cases, including enhanced protections for private applications and data security posture management (DSPM) attributes. While other vendors focus on enabling safe user access to AI applications,…
Sentra Data Security for AI Agents protects AI-powered assistants
Sentra launched Data Security for AI Agents solution, specifically designed to address the emerging challenges associated with proliferating AI assistants and empower large enterprises to embrace AI innovation securely and responsibly. With the solution, Sentra also announced platform support for…
Abnormal AI improves security awareness training with AI agents
Abnormal AI introduces autonomous AI agents that improve how organizations train employees and report on risk while also evolving its email security capabilities. In a year defined by the explosive use of malicious AI for cybercrime, Abnormal is doubling down…
Anetac Human Link Pro secures both human and non-human identities
Anetac announced the global rollout of Human Link Pro. This new capability unifies the management of human and non-human identity vulnerabilities within the Anetac Identity Vulnerability Management Platform. Already in use by organizations in financial services, retail, healthcare and critical…
Flashpoint Ignite enhancements improve threat intelligence
Flashpoint announced new capabilities to its flagship platform, Flashpoint Ignite. These innovations are designed to deliver insights that align with customers’ threat intelligence needs, enabling organizations to make informed decisions and protect their most critical assets. “Too often, high-value threat…
Avocado OS: Open-source Linux platform for embedded systems
Peridio, a platform for building and maintaining advanced embedded products, has launched Avocado OS, an open-source embedded Linux distribution made to simplify the way developers build complex embedded systems. Avocado OS focuses on delivering a smooth developer experience while offering…
RSA defends organizations against AI-powered identity attacks
RSA announced cybersecurity innovations that defend organizations against the next wave of AI powered identity attacks, including IT Help Desk bypasses, malware, social engineering, and other threats. These advancements are especially critical for organizations implementing passwordless strategies and further solidify…
Wallarm Agentic AI Protection blocks attacks against AI agents
Wallarm unveiled Agentic AI Protection, a capability designed to secure AI agents from emerging attack vectors, such as prompt injection, jailbreaks, system prompt retrieval, and agent logic abuse. The new feature extends Wallarm’s API Security Platform to actively monitor, analyze,…
NetRise ZeroLens identifies undisclosed software weaknesses
NetRise announced a new product, NetRise ZeroLens. NetRise’s category redefining platform creates a software asset inventory, which is critical to manage organizational risk. NetRise analyzes compiled code to find risk in software that actually executes on devices and other systems.…
Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
CVE-2025-31324, a critical vulnerability in the SAP NetWeaver platform, is being actively exploited by attackers to upload malicious webshells to enable unauthorized file uploads and code execution. The vulnerability was initially leveraged in zero-day attacks spotted by ReliaQuest researchers, who…
Allurity acquires Infigo IS to strengthen its position in Europe
Allurity announces its acquisition of Croatian cybersecurity company Infigo IS. With deep technical expertise and one of southern Europe’s strongest offensive security teams, Infigo brings strengths that accelerate Allurity’s journey to become the preferred cybersecurity partner in Europe. Founded in…
Threat actors are scanning your environment, even if you’re not
In a world where organizations’ digital footprint is constantly changing and attackers regularly capitalize on security failings in exposed IT assets, making the effort to minimize your external attack surface is a no-brainer. The goal is simple: Make your organization…
GoSearch: Open-source OSINT tool for uncovering digital footprints
GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific usernames. Designed for speed and accuracy, it lets users quickly track someone’s online presence across multiple platforms. GoSearch incorporates data from Hudson Rock’s Cybercrime Database, offering…
Ransomware attacks are getting smarter, harder to stop
Ransomware attacks are becoming more refined and pervasive, posing significant challenges to organizations globally. A Veeam report reveals that while the percentage of companies impacted by ransomware attacks has slightly declined from 75% to 69%, the threat remains substantial. This…
Most critical vulnerabilities aren’t worth your attention
Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still contain at least one vulnerability By…
Week in review: MITRE ATT&CK v17.0 released, PoC for Erlang/OTP SSH bug is public
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs MITRE has released the latest version of its ATT&CK framework, which now also includes a new…