Help Net Security - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
Help Net Security

Help Net Security

Publication
0 followers

Established cybersecurity portal providing daily news and expert security advisories.

Recent Posts

The Hidden Security Cost of Treating Labs Like Data Centers
News•Feb 23, 2026

The Hidden Security Cost of Treating Labs Like Data Centers

In a Help Net Security interview, Rich Kellen, VP‑CISO of IFF, warns that treating operational technology (OT) labs like conventional IT data centers creates hidden security risks that can corrupt scientific results and endanger safety. He explains that OT environments cannot rely on backup‑based recovery because experiments are non‑deterministic and their integrity is paramount. Kellen highlights the need for outcome‑centric impact models, “good enough” visibility focused on communication flows, and risk‑based controls such as ISO 27001, while stressing collaboration with scientists to avoid counterproductive compensating controls. The interview underscores that misapplied IT frameworks can lead to irreversible data loss and regulatory exposure.

By Help Net Security
LLMs Change Their Answers Based on Who’s Asking
News•Feb 20, 2026

LLMs Change Their Answers Based on Who’s Asking

A MIT Center for Constructive Communication study reveals that leading large language models—GPT‑4, Claude 3 Opus, and Llama 3‑8B—alter answer quality based on perceived user traits. When prompted with biographies suggesting lower education, non‑native English proficiency, or foreign nationality, all three models show...

By Help Net Security
Security Compass Brings Policy-Driven Security and Compliance to Agentic AI Development
News•Feb 20, 2026

Security Compass Brings Policy-Driven Security and Compliance to Agentic AI Development

Security Compass unveiled SD Elements for Agentic AI Workflow, a platform that embeds policy‑driven security and compliance checks directly into AI‑assisted software development. The solution automatically generates, validates, and records evidence that both human developers and autonomous AI agents adhere to...

By Help Net Security
The CISO View of Fraud Risk Across the Retail Payment Ecosystem
News•Feb 20, 2026

The CISO View of Fraud Risk Across the Retail Payment Ecosystem

In a Help Net Security interview, Paul Suarez, VP and CISO of Casey’s, explains that fuel‑payment hardware receives the same disciplined patching and modernization approach as other retail technology. He warns that QR‑code payment methods create fresh fraud opportunities, prompting...

By Help Net Security
Applying Green Energy Tax Policies to Improve Cybersecurity
News•Feb 20, 2026

Applying Green Energy Tax Policies to Improve Cybersecurity

Governments are proposing to mirror green‑energy tax incentives to boost cybersecurity, pairing financial rewards with a digital trust label similar to ENERGY STAR. The model would grant tax credits or rebates to firms that achieve the label, encouraging security‑by‑design across...

By Help Net Security
CYBERSPAN Brings AI-Driven, Agentless Network Detection to MSSP Environments
News•Feb 18, 2026

CYBERSPAN Brings AI-Driven, Agentless Network Detection to MSSP Environments

IntelliGenesis launched CYBERSPAN, an AI‑driven network detection and response solution tailored for managed security service providers. The platform offers a multi‑tenant, agentless architecture that can be deployed on‑premises or in the cloud, integrating with existing SIEM, SOAR and ticketing tools...

By Help Net Security
Lasso’s Intent Deputy Secures AI Agents Through Real-Time Behavioral Intent Analysis
News•Feb 18, 2026

Lasso’s Intent Deputy Secures AI Agents Through Real-Time Behavioral Intent Analysis

Lasso Security unveiled Intent Deputy, a runtime behavioral‑intent framework that secures autonomous AI agents by interpreting their decision flow and operational context. The solution claims 99.83% threat detection at sub‑50 ms latency and a 570‑fold cost advantage over cloud‑native guardrails. By...

By Help Net Security
Microsoft Defender Update Lets SOC Teams Manage, Vet Response Tools
News•Feb 18, 2026

Microsoft Defender Update Lets SOC Teams Manage, Vet Response Tools

Microsoft Defender now includes a Library Management feature that lets security operations centers (SOCs) organize, preview, and control the scripts and tools used in live response. Analysts can upload PowerShell, batch, and other response files ahead of investigations, making them...

By Help Net Security
AWS Coding Agents Gain New Plugin Support Across Development Tools
News•Feb 18, 2026

AWS Coding Agents Gain New Plugin Support Across Development Tools

AWS introduced Agent Plugins, a framework that equips AI coding assistants with native AWS capabilities. The initial "deploy‑to‑AWS" plugin lets developers issue natural‑language prompts to generate architecture recommendations, cost estimates, and infrastructure‑as‑code templates. It currently integrates with Claude Code and...

By Help Net Security
The Defense Industrial Base Is a Prime Target for Cyber Disruption
News•Feb 18, 2026

The Defense Industrial Base Is a Prime Target for Cyber Disruption

Cyber adversaries are moving beyond classic espionage to disrupt the defense industrial base (DIB), aiming to cripple production capacity and supply chains. Attackers now target everything from large primes to niche startups, especially firms with dual‑use technologies, using ransomware and...

By Help Net Security
Everyone Uses Open Source, but Patching Still Moves Too Slowly
News•Feb 18, 2026

Everyone Uses Open Source, but Patching Still Moves Too Slowly

Enterprise security teams now rely on open source for core infrastructure, development pipelines, and production applications, yet patching cycles remain sluggish. TuxCare’s 2026 Open Source Landscape Report shows that 60% of recent incidents involved known vulnerabilities that were not patched...

By Help Net Security
REMnux V8 Brings AI Integration to the Linux Malware Analysis Toolkit
News•Feb 17, 2026

REMnux V8 Brings AI Integration to the Linux Malware Analysis Toolkit

REMnux released version 8, rebuilt on Ubuntu 24.04 LTS, and introduces a new Cast‑based installer that handles fresh deployments, upgrades, and container installs. The highlight is the REMnux MCP server, which implements the Model Context Protocol to connect AI agents with the...

By Help Net Security
Passwork 7.4 Enhances Enterprise Security with Centralized User Vault Restrictions
News•Feb 16, 2026

Passwork 7.4 Enhances Enterprise Security with Centralized User Vault Restrictions

Passwork has launched version 7.4, adding centralized restrictive settings for User vaults. Administrators can now block adding users, sending passwords, creating links, and shortcuts across all personal vaults. The controls apply automatically to existing and new vaults, tightening data‑leak defenses and...

By Help Net Security
Microsoft Equips CISOs and AI Risk Leaders with a New Security Tool
News•Feb 16, 2026

Microsoft Equips CISOs and AI Risk Leaders with a New Security Tool

Microsoft has launched a public‑preview Security Dashboard for AI, consolidating posture and real‑time risk signals from Microsoft Defender, Entra, and Purview into a single interface. The tool inventories AI assets—including models, agents, and third‑party applications—and surfaces AI‑related security risks in...

By Help Net Security
ChatGPT Gets New Security Feature to Fight Prompt Injection Attacks
News•Feb 16, 2026

ChatGPT Gets New Security Feature to Fight Prompt Injection Attacks

OpenAI has added a Lockdown Mode and Elevated Risk labels to ChatGPT to mitigate prompt‑injection attacks and other security threats. Lockdown Mode restricts tool and network access, allowing admins to create dedicated roles that limit external interactions, initially for Enterprise,...

By Help Net Security
Apple Privacy Labels Often Don’t Match What Chinese Smart Home Apps Do
News•Feb 16, 2026

Apple Privacy Labels Often Don’t Match What Chinese Smart Home Apps Do

A new study of 49 Chinese smart‑home apps on Apple’s App Store reveals systematic gaps in by‑stander privacy and frequent mismatches between privacy policies, user‑interface controls, and App Store privacy labels. All apps require real‑name phone registration and collect a...

By Help Net Security
In GitHub’s Advisory Pipeline, some Advisories Move Faster than Others
News•Feb 16, 2026

In GitHub’s Advisory Pipeline, some Advisories Move Faster than Others

A new study of 288,604 GitHub Security Advisories from 2019‑2025 shows that only about 8% (23,563) complete GitHub’s formal review process. Advisories created directly in repositories are reviewed far faster—median under one day—than those imported from the National Vulnerability Database,...

By Help Net Security
Don’t Panic over CISA’s KEV List, Use It Smarter
News•Feb 16, 2026

Don’t Panic over CISA’s KEV List, Use It Smarter

In a Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains CISA’s Known Exploited Vulnerabilities (KEV) Catalog and clears up common misconceptions. He notes that KEV entries vary in urgency, with some requiring local access and...

By Help Net Security
MOS: Open-Source Modular OS for Servers and Homelabs
News•Feb 16, 2026

MOS: Open-Source Modular OS for Servers and Homelabs

MOS is an open‑source, modular operating system built on Devuan that targets homelab enthusiasts and small‑scale server operators. It unifies server monitoring, storage pooling, container orchestration, and virtualization behind a browser‑based dashboard and a REST/WebSocket API. The platform leverages mergerfs...

By Help Net Security
Imprivata Delivers Passwordless Access to Improve Security, Compliance, and Productivity
News•Feb 10, 2026

Imprivata Delivers Passwordless Access to Improve Security, Compliance, and Productivity

Imprivata has expanded its Enterprise Access Management platform with context‑aware passwordless authentication, AI‑powered risk signaling, and behavioral analytics. The new suite supports FIDO passkeys, facial recognition, and zero‑trust VPN‑less remote access, aiming to streamline access for frontline staff and knowledge...

By Help Net Security
Portnox Expands ZTNA with Passwordless Access for RDP, SSH, and Enterprise Consoles
News•Feb 10, 2026

Portnox Expands ZTNA with Passwordless Access for RDP, SSH, and Enterprise Consoles

Portnox has broadened its zero‑trust network access (ZTNA) platform to include passwordless connectivity for console‑based protocols such as RDP, SSH, VNC and Telnet. The expansion removes credential‑based authentication, a vector behind roughly 80 % of data breaches, while preserving a frictionless...

By Help Net Security
BloodHound Scentry Helps Organizations Reduce Identity Risk and Close Attack Paths
News•Feb 10, 2026

BloodHound Scentry Helps Organizations Reduce Identity Risk and Close Attack Paths

SpecterOps has launched BloodHound Scentry, a managed service that pairs the BloodHound Enterprise platform with seasoned security practitioners to fast‑track identity attack‑path management (APM). The offering delivers tailored remediation, monthly threat analysis, privilege‑zone design, OpenGraph extensions, and custom reporting, promising...

By Help Net Security
Trojanized 7-Zip Downloads Turn Home Computers Into Proxy Nodes
News•Feb 10, 2026

Trojanized 7-Zip Downloads Turn Home Computers Into Proxy Nodes

Malwarebytes discovered a trojanized version of the popular 7‑Zip installer that silently adds proxyware payloads, turning compromised home computers into residential proxy nodes. The malicious installer is hosted on a look‑alike domain (7zip.com) and is often reached through erroneous links...

By Help Net Security
Armis Centrix Brings Unified, AI-Driven Application Security to the SDLC
News•Feb 10, 2026

Armis Centrix Brings Unified, AI-Driven Application Security to the SDLC

Armis introduced Centrix for Application Security, an AI‑driven platform that unifies vulnerability detection across the entire software development lifecycle. The solution scans source code, dependencies, container images and configuration files in unlimited languages, delivering context‑aware insights tied to the CI/CD...

By Help Net Security
DuckDuckGo Enables AI Voice Chat without Saving Voice Data
News•Feb 10, 2026

DuckDuckGo Enables AI Voice Chat without Saving Voice Data

DuckDuckGo has integrated AI-powered voice chat into its Duck.ai assistant, allowing users to converse with the model using spoken input. The company emphasizes that audio streams are processed in real time and are not stored after the session, with encryption...

By Help Net Security
How AI Is Reshaping Attack Path Analysis
News•Feb 10, 2026

How AI Is Reshaping Attack Path Analysis

Cybersecurity teams are drowning in disparate findings, while adversaries leverage AI to craft rapid attack chains. By integrating AI with the MITRE ATT&CK framework, organizations can generate dynamic heat maps that surface coverage gaps and model realistic attack paths. Platforms...

By Help Net Security
What Happens when Cybersecurity Knowledge Walks Out the Door
News•Feb 10, 2026

What Happens when Cybersecurity Knowledge Walks Out the Door

Andrew Northern, Principal Security Researcher at Censys, argues that mentorship is vital for preserving institutional memory and judgment under pressure in cybersecurity teams. He warns that when senior defenders disengage, the tacit knowledge needed to protect legacy‑heavy environments evaporates quickly....

By Help Net Security
AI-Driven Scams Are Eroding Trust in Calls, Messages, and Meetings
News•Feb 10, 2026

AI-Driven Scams Are Eroding Trust in Calls, Messages, and Meetings

AI agents are now automating the research and targeting phases of social engineering, turning weeks‑long preparations into minutes. This automation lowers both the skill threshold and cost for launching phishing and scam campaigns. Deepfake audio and video are being used...

By Help Net Security
Cybersecurity Jobs Available Right Now: February 10, 2026
News•Feb 10, 2026

Cybersecurity Jobs Available Right Now: February 10, 2026

February 2026’s cybersecurity job roundup lists 26 open positions across 12 countries, ranging from cloud security engineers to senior threat‑intelligence analysts. The roles cover cloud, AI, OT, and zero‑trust specializations, with many offering hybrid or fully remote work. Employers span consulting...

By Help Net Security
BeyondTrust Fixes Easy-to-Exploit Pre-Auth RCE Vulnerability in Remote Access Tools (CVE-2026-1731)
News•Feb 9, 2026

BeyondTrust Fixes Easy-to-Exploit Pre-Auth RCE Vulnerability in Remote Access Tools (CVE-2026-1731)

BeyondTrust has patched a critical pre‑authentication remote code execution flaw (CVE‑2026‑1731) affecting its Remote Support and Privileged Remote Access products. The vulnerability lets unauthenticated attackers run OS commands on vulnerable on‑premise deployments. SaaS customers received the fix on February 2 2026, while...

By Help Net Security
OpenAI Updates Europe Privacy Policy, Adding New Data Categories
News•Feb 9, 2026

OpenAI Updates Europe Privacy Policy, Adding New Data Categories

OpenAI has refreshed its Europe‑facing privacy policy to align with the November 2024 EU revisions. The new document expands coverage to include files, images, audio, video, and contact data, while adding clearer sections on user controls such as opting out of...

By Help Net Security
United Airlines CISO on Building Resilience when Disruption Is Inevitable
News•Feb 9, 2026

United Airlines CISO on Building Resilience when Disruption Is Inevitable

United Airlines’ chief information security officer, Deneen DeFiore, explained how the carrier modernizes cybersecurity without jeopardizing safety‑critical aircraft systems. The airline wraps legacy platforms with modern identity, segmentation and monitoring controls while adding compensating resilience measures. United treats cyber risk...

By Help Net Security
Allama: Open-Source AI Security Automation
News•Feb 9, 2026

Allama: Open-Source AI Security Automation

Allama is an open‑source security automation platform that lets teams build visual workflows for threat detection and response. It ships with integrations for more than 80 security tools, from SIEMs to ticketing systems, and leverages AI‑powered agents that can enrich,...

By Help Net Security
AI Agents Behave Like Users, but Don’t Follow the Same Rules
News•Feb 9, 2026

AI Agents Behave Like Users, but Don’t Follow the Same Rules

The Cloud Security Alliance report warns that autonomous AI agents are expanding faster than identity and access management (IAM) frameworks can keep up. Organizations still rely on static credentials such as API keys and shared accounts, while modern workload‑identity standards...

By Help Net Security
State-Backed Phishing Attacks Targeting Military Officials and Journalists on Signal
News•Feb 6, 2026

State-Backed Phishing Attacks Targeting Military Officials and Journalists on Signal

German authorities have identified a likely state‑backed hacking group targeting senior political figures, military officials, diplomats, and investigative journalists via the Signal messaging app. The attackers use two phishing variants: impersonating Signal support to solicit security PINs or verification codes,...

By Help Net Security
MintMCP’s Governance Platform Helps Organizations Deploy, Monitor, and Secure AI Agents
News•Feb 6, 2026

MintMCP’s Governance Platform Helps Organizations Deploy, Monitor, and Secure AI Agents

MintMCP introduced an enterprise governance platform that lets organizations deploy, monitor, and secure AI agents and MCP servers at scale. The solution offers one‑click MCP server provisioning, real‑time agent activity tracing, and configurable guardrails to block risky actions. It also...

By Help Net Security
February 2026 Patch Tuesday Forecast: Lots of OOB Love This Month
News•Feb 6, 2026

February 2026 Patch Tuesday Forecast: Lots of OOB Love This Month

Microsoft’s February 2026 Patch Tuesday follows a heavy January with 92 Windows 11/Server 2025 and 79 Windows 10 vulnerabilities addressed. Three out‑of‑band (OOB) patches were released in January to fix remote‑desktop credential prompts, Outlook .pst cloud storage errors, and a zero‑day Office vulnerability...

By Help Net Security
Kasada Account Intelligence Combats Manual Fraud and Abuse
News•Feb 6, 2026

Kasada Account Intelligence Combats Manual Fraud and Abuse

Kasada has launched Account Intelligence, a real‑time solution that detects manual, account‑level fraud and abuse before financial loss occurs. The product uses high‑fidelity device telemetry linked to account behavior, allowing early identification of credential abuse, promo fraud, and coordinated multi‑account...

By Help Net Security
Mobile Privacy Audits Are Getting Harder
News•Feb 6, 2026

Mobile Privacy Audits Are Getting Harder

Mobile privacy audits face verification gaps as apps hide data flows behind permissions and encrypted traffic. The new mopri framework combines static analysis of APKs with dynamic, user‑driven execution to capture real‑world network activity on Android devices. It offers modular...

By Help Net Security
The Hidden Cost of Putting Off Security Decisions
News•Feb 6, 2026

The Hidden Cost of Putting Off Security Decisions

Hanah Darley, Chief AI Officer at Geordie AI, warns that postponing security decisions creates a hidden "visibility debt" that compounds over time. Each quarter without adequate insight allows shadow IT, legacy systems, and unmanaged assets to proliferate, leading to larger...

By Help Net Security
Microsoft Launches LiteBox, a Security-Focused Open-Source Library OS
News•Feb 5, 2026

Microsoft Launches LiteBox, a Security-Focused Open-Source Library OS

Microsoft unveiled LiteBox, an open‑source library operating system designed to act as a secure kernel layer for protecting guest kernels through hardware virtualization. Developed alongside the Linux Virtualization Based Security (LVBS) project, LiteBox runs security‑critical code in a hardened, isolated...

By Help Net Security
AiStrike Introduces AI-Powered MDR to Reduce Costs and Alert Fatigue
News•Feb 5, 2026

AiStrike Introduces AI-Powered MDR to Reduce Costs and Alert Fatigue

AiStrike has launched AiStrike MDR, an AI‑powered managed detection and response service that replaces traditional human‑intensive SOCs with an AI‑led, expert‑guided model. The platform unifies threat intelligence, detection, investigation and response across cloud, endpoint and identity data, delivering automated triage...

By Help Net Security
Varonis Acquires AllTrue.ai to Enable Safe, Compliant AI at Scale
News•Feb 5, 2026

Varonis Acquires AllTrue.ai to Enable Safe, Compliant AI at Scale

Varonis announced the acquisition of AllTrue.ai to embed AI‑specific visibility and enforcement into its data‑centric security platform. The combined solution gives enterprises real‑time insight into AI models, agents and shadow AI, while applying guardrails that enforce least‑privilege access and compliance....

By Help Net Security
Smart Glasses Are Back, Privacy Issues Included
News•Feb 5, 2026

Smart Glasses Are Back, Privacy Issues Included

After the failure of Google Glass, smart glasses are re‑emerging, led by the Ray‑Ban Meta collaboration that blends fashion with AI‑enabled camera and microphone. Harvard students showed the device’s video can be fed into facial‑recognition systems to identify strangers, while...

By Help Net Security
Cybersecurity Planning Keeps Moving Toward Whole-of-Society Models
News•Feb 5, 2026

Cybersecurity Planning Keeps Moving Toward Whole-of-Society Models

National governments are reshaping cybersecurity into whole‑of‑society frameworks that link risk management, workforce development, technology standards, and cross‑sector coordination. Centralized authorities act as hubs for incident response, intelligence sharing, and international cooperation, while private operators remain pivotal for critical infrastructure...

By Help Net Security
Measuring AI Use Becomes a Business Requirement
News•Feb 5, 2026

Measuring AI Use Becomes a Business Requirement

A Larridin survey reveals a 16‑point visibility gap between executives and directors on AI usage, highlighting pervasive shadow AI and fragmented governance. Large enterprises run an average of 23 AI tools, yet only 38 percent maintain a comprehensive inventory, leaving many...

By Help Net Security
Varonis Acquires AllTrue.ai to Boost AI Security Capabilities
Deals•Feb 5, 2026

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities

Varonis announced the acquisition of AI security startup AllTrue.ai, adding real‑time visibility and enforcement for AI systems to its data security platform. The deal expands Varonis’ capabilities in AI‑TRiSM, helping organizations monitor and control AI models, agents, and data access....

Help Net Security
ConnectSecure Introduces Linux Patching Capability to Simplify Cross-Distro Updates
News•Feb 4, 2026

ConnectSecure Introduces Linux Patching Capability to Simplify Cross-Distro Updates

ConnectSecure unveiled a cross‑platform Linux patching capability that consolidates updates for Red Hat, Ubuntu, Debian, and CentOS into a single console. The tool automates kernel and OS patch identification and deployment, cutting manual effort by up to 80 %. It also introduces...

By Help Net Security
Claroty Secures $150M Series F Funding Led by Golub Growth
Deals•Jan 22, 2026

Claroty Secures $150M Series F Funding Led by Golub Growth

Claroty announced a $150 million Series F round led by Golub Growth, an affiliate of Golub Capital, with existing investors contributing up to $50 million. The capital will fund global expansion and further development of its cyber‑physical systems protection platform.

Help Net Security
Cyera Raises $400M in Series F Round, Valuation Hits $9B
Deals•Jan 8, 2026

Cyera Raises $400M in Series F Round, Valuation Hits $9B

Cyera announced a $400 million Series F funding round, bringing total funding to over $1.7 billion and valuing the company at $9 billion. The round was led by Blackstone funds and included participation from existing investors such as Accel, Coatue, Sequoia Capital...

Help Net Security

Page 2 of 5

← Prev1234Next →