Help Net Security - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
Help Net Security

Help Net Security

Publication
0 followers

Established cybersecurity portal providing daily news and expert security advisories.

Recent Posts

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities
Deals•Feb 5, 2026

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities

Varonis announced the acquisition of AI security startup AllTrue.ai, adding real‑time visibility and enforcement for AI systems to its data security platform. The deal expands Varonis’ capabilities in AI‑TRiSM, helping organizations monitor and control AI models, agents, and data access. Financial terms were not disclosed.

Help Net Security
SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR
News•Feb 4, 2026

SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR

SECNAP Network Security launched CloudJacket MXDR, a managed extended detection and response platform that unifies SOC, SIEM, and NDR functions under a single pane of glass. Built on the patented CloudJacket foundation, the solution adds multi‑tenant capabilities, AI‑augmented analyst workflows,...

By Help Net Security
Avast Brings Deepfake Scam Detection to Windows PCs and Mobile Devices
News•Feb 4, 2026

Avast Brings Deepfake Scam Detection to Windows PCs and Mobile Devices

Avast announced the global rollout of its Scam Guardian and Scam Guardian Pro apps for Android and iOS, and introduced Deepfake Guard for Windows PCs. The new AI‑driven feature scans video audio in real time to detect malicious deepfake content, supporting...

By Help Net Security
Detectify Internal Scanning Finds and Fixes Vulnerabilities Behind the Firewall
News•Feb 4, 2026

Detectify Internal Scanning Finds and Fixes Vulnerabilities Behind the Firewall

Detectify introduced Internal Scanning, a tool that extends its external‑facing crawling and fuzzing engine into private networks, enabling security teams to locate and fix vulnerabilities behind the firewall with the same speed as external tests. The solution deploys via a...

By Help Net Security
Global Threat Map: Open-Source Real-Time Situational Awareness Platform
News•Feb 4, 2026

Global Threat Map: Open-Source Real-Time Situational Awareness Platform

Global Threat Map is an open‑source platform that aggregates multiple public threat‑intelligence feeds into a live, animated world map showing malware, phishing, botnet and other malicious activity. The project publishes its data‑collection code on GitHub, offering full transparency of sources...

By Help Net Security
How Secure by Design Helps Developers Build Secure Software
News•Feb 4, 2026

How Secure by Design Helps Developers Build Secure Software

The Center for Internet Security and SAFECode have published "Secure by Design: A Guide to Assessing Software Security Practices," a risk‑based manual that integrates security into every stage of the software development lifecycle. The guide aligns the NIST Secure Software...

By Help Net Security
Why Incident Response Breaks Down when It Matters Most
News•Feb 4, 2026

Why Incident Response Breaks Down when It Matters Most

In a Help Net Security video, Jon David, Managing Director at NR Labs, explains why incident response often collapses during active breaches. He highlights that hesitation, poor escalation, and weak communication let attackers outpace defenders. The discussion emphasizes that trust,...

By Help Net Security
Auto Finance Fraud Is Costing Dealers up to $20,000 per Incident
News•Feb 4, 2026

Auto Finance Fraud Is Costing Dealers up to $20,000 per Incident

Auto dealers are facing a growing fraud problem that can cost up to $20,000 per incident, according to Experian research. The most common schemes involve income and employment misrepresentation, followed closely by synthetic and third‑party identity fraud. Fraud often surfaces...

By Help Net Security
Download: Tines Voice of Security 2026 Report
News•Feb 3, 2026

Download: Tines Voice of Security 2026 Report

Tines has released its Voice of Security 2026 report, based on a survey of more than 1,800 security leaders and practitioners worldwide. The study reveals that while AI adoption is accelerating across security teams, manual work, rising workloads and burnout remain...

By Help Net Security
Sandisk Brings SPRandom to Open Source for Large SSD Testing
News•Feb 3, 2026

Sandisk Brings SPRandom to Open Source for Large SSD Testing

SanDisk unveiled SPRandom, an open‑source preconditioning utility for large‑capacity enterprise SSDs. The tool, contributed to the fio benchmark suite, can shrink the time required to bring a 128 TB drive to steady state from over 144 hours to roughly six hours—a reduction...

By Help Net Security
Malwarebytes in ChatGPT Delivers AI-Powered Protection Against Scams
News•Feb 2, 2026

Malwarebytes in ChatGPT Delivers AI-Powered Protection Against Scams

Malwarebytes has launched Malwarebytes in ChatGPT, embedding its threat‑intelligence engine into OpenAI’s chatbot to let users instantly assess scams, phishing links, and suspicious domains. The service draws on a continuously updated database that protects millions of devices, offering point‑by‑point analysis...

By Help Net Security
Span Cyber Security Arena 2026: Only 10 Days Left to Secure Early Bird Tickets
News•Feb 2, 2026

Span Cyber Security Arena 2026: Only 10 Days Left to Secure Early Bird Tickets

Span Cyber Security Arena 2026 will be held May 20‑22 in Poreč, Croatia, at the five‑star Pical Resort. The event features three days of conference sessions plus two pre‑conference masterclasses on May 18‑19 for engineers, architects, and consultants. Keynote speakers include...

By Help Net Security
Open-Source AI Pentesting Tools Are Getting Uncomfortably Good
News•Feb 2, 2026

Open-Source AI Pentesting Tools Are Getting Uncomfortably Good

Open‑source AI pentesting tools are reaching production‑grade performance, with BugTrace‑AI, Shannon, and the Cybersecurity AI Framework (CAI) each demonstrating distinct strengths in a lab test. BugTrace‑AI acts as a low‑noise reconnaissance assistant, flagging likely flaws without launching exploits. Shannon takes...

By Help Net Security
Where NSA Zero Trust Guidance Aligns with Enterprise Reality
News•Feb 2, 2026

Where NSA Zero Trust Guidance Aligns with Enterprise Reality

The NSA released Phase One and Phase Two of its Zero Trust Implementation Guidelines, outlining 36 and 41 activities respectively to achieve 30 and 34 distinct capabilities. The guidance builds on earlier Primer and Discovery Phase documents and aligns with...

By Help Net Security
Pompelmi: Open-Source Secure File Upload Scanning for Node.js
News•Feb 2, 2026

Pompelmi: Open-Source Secure File Upload Scanning for Node.js

Pompelmi is an open‑source toolkit that adds inline malware scanning to Node.js file‑upload handlers. It inspects files in memory, applying configurable policies on extensions, size, MIME types, and archive contents before any data reaches storage. The library offers pluggable scanning...

By Help Net Security
What Boards Need to Hear About Cyber Risk, and What They Don’t
News•Feb 2, 2026

What Boards Need to Hear About Cyber Risk, and What They Don’t

Entrust CIO Rishi Kaushal explains how security leaders should brief corporate boards on cyber risk, linking cryptography, certificates, and authentication to tangible business outcomes such as revenue loss, outages, fraud, and regulatory exposure. He demystifies the digital‑trust layer, arguing that...

By Help Net Security
AI Is Flooding IAM Systems with New Identities
News•Feb 2, 2026

AI Is Flooding IAM Systems with New Identities

The Cloud Security Alliance reports that AI‑generated identities are being treated like traditional non‑human accounts, exposing them to the same IAM weaknesses such as credential sprawl and unclear ownership. AI systems create and retire identities at unprecedented speed, overwhelming legacy...

By Help Net Security
Microsoft Sets New Timeline for Sentinel Transition to Defender Portal
News•Jan 30, 2026

Microsoft Sets New Timeline for Sentinel Transition to Defender Portal

Microsoft has postponed the migration of Microsoft Sentinel from the Azure portal to the Microsoft Defender portal, setting a new sunset date of March 31 2027—about nine months later than originally planned. The shift responds to extensive customer and partner feedback requesting...

By Help Net Security
Arkose Titan Aims to Make Bot, Scraping, and AI Fraud Economically Unviable
News•Jan 30, 2026

Arkose Titan Aims to Make Bot, Scraping, and AI Fraud Economically Unviable

Arkose Labs unveiled Arkose Titan, a unified platform that defends against both human‑driven and AI‑powered fraud, scraping, and bot attacks. The solution consolidates bot detection, device and email intelligence, API security, behavioral biometrics, and phishing protection into a single API...

By Help Net Security
EFF Calls Out Major Tech Companies on Encryption Promises
News•Jan 30, 2026

EFF Calls Out Major Tech Companies on Encryption Promises

The Electronic Frontier Foundation (EFF) has launched the "Encrypt It Already" campaign, urging major tech firms to fulfill announced end‑to‑end encryption promises, enable encryption by default, and broaden encrypted storage. The initiative groups demands into three categories—Keep your promises, Defaults...

By Help Net Security
Apple’s New Privacy Feature Limits How Precisely Carriers Track Your Location
News•Jan 30, 2026

Apple’s New Privacy Feature Limits How Precisely Carriers Track Your Location

Apple introduced a new privacy setting called Limit Precise Location in iOS 26.3, which reduces the granularity of location data shared with cellular networks. When enabled, carriers can only determine a user’s approximate neighborhood rather than the exact address, while app‑level...

By Help Net Security
Wearable Tech Adoption Continues as Privacy Worries Grow
News•Jan 30, 2026

Wearable Tech Adoption Continues as Privacy Worries Grow

Over one billion people now wear fitness trackers that continuously collect health metrics, creating a massive stream of sensitive personal data. A recent Clutch survey shows 74% of users are worried about how this data is handled, while only 58%...

By Help Net Security
Virtue AI AgentSuite Enables Enterprises to Test and Secure AI Agents
News•Jan 29, 2026

Virtue AI AgentSuite Enables Enterprises to Test and Secure AI Agents

Virtue AI has launched AgentSuite, a multi‑layer security and compliance platform designed for enterprise AI agents. The solution lets organizations test agents, enforce real‑time guardrails, and control tool access while providing full audit trails. IBM research shows 79% of enterprises...

By Help Net Security
Druva Threat Watch Offers Continuous Threat Monitoring of Backup Data
News•Jan 29, 2026

Druva Threat Watch Offers Continuous Threat Monitoring of Backup Data

Druva launches Threat Watch, a zero‑touch, cloud‑native solution that continuously scans backup snapshots for dormant threats and indicators of compromise. The service runs inside Druva’s Data Security Cloud, eliminating the need for extra hardware or agents and delivering near‑real‑time detection...

By Help Net Security
Conditional Access Enforcement Change Coming to Microsoft Entra
News•Jan 29, 2026

Conditional Access Enforcement Change Coming to Microsoft Entra

Microsoft announced that starting March 27 2026, Conditional Access policies in Microsoft Entra will be enforced during sign‑ins even when resource exclusions are configured, with a phased rollout through June 2026. The change specifically targets sign‑ins from client applications that request only OIDC...

By Help Net Security
N-Able Brings AI to Endpoint, Security, and Recovery
News•Jan 29, 2026

N-Able Brings AI to Endpoint, Security, and Recovery

N‑able unveiled AI‑enhanced capabilities across its endpoint management, security operations, and data‑protection suite. Leveraging telemetry from over 11 million managed devices and a network of 25,000+ service providers, the company now offers agentic AI that automates scripting, threat detection, and recovery...

By Help Net Security
Tosi Platform Delivers Unified Connectivity, Visibility, and Security for OT at Scale
News•Jan 29, 2026

Tosi Platform Delivers Unified Connectivity, Visibility, and Security for OT at Scale

Tosi has launched a purpose‑built OT platform that consolidates connectivity, visibility, and security into a single console. The offering includes Tosi Control for fleet management and real‑time status, with Tosi Insight adding traffic analytics and anomaly detection, and a full...

By Help Net Security
Sumsub’s AI Agent Verification Binds Automation to Verified Human Identity
News•Jan 29, 2026

Sumsub’s AI Agent Verification Binds Automation to Verified Human Identity

Sumsub has introduced AI Agent Verification, a new layer that ties AI‑driven automation to a verified human identity through its Know Your Agent framework. The solution detects automated activity, evaluates its risk, and triggers targeted liveness checks when needed, ensuring...

By Help Net Security
Cside VPN Detection Enables Control of VPN Traffic to Prevent Fraud and Legal Exposure
News•Jan 29, 2026

Cside VPN Detection Enables Control of VPN Traffic to Prevent Fraud and Legal Exposure

cside has launched VPN Detection, a solution that identifies and manages traffic routed through virtual private networks. Unlike traditional IP‑list methods, it analyzes network behavior, browser fingerprints, and packet timing across OSI layers three to seven. The tool aims to...

By Help Net Security
Google Agrees to Pay $135 Million over Android Data Harvesting Claims
News•Jan 29, 2026

Google Agrees to Pay $135 Million over Android Data Harvesting Claims

Google has agreed to a $135 million settlement to resolve a class action alleging Android devices transmitted system‑service data over cellular networks without user consent. The lawsuit, spanning over five years, claimed background data transfers drained users’ plans starting in November...

By Help Net Security
A Practical Take on Cyber Resilience for CISOs
News•Jan 29, 2026

A Practical Take on Cyber Resilience for CISOs

Standard Chartered CISO Shebani Baweja explains cyber resilience as an extension of information security focused on recovery, trust, and continuity during severe incidents. She highlights three priority areas: managing third‑party risk, preparing for emerging threats like AI‑driven attacks, and embedding...

By Help Net Security
ImmuniWeb Reports Double-Digit Growth and Platform Advances
News•Jan 29, 2026

ImmuniWeb Reports Double-Digit Growth and Platform Advances

ImmuniWeb reported an all‑time sales record for 2025, maintaining double‑digit year‑over‑year growth while staying profitable. The company rolled out four major AI Platform updates, adding AI‑specific testing for web, mobile, API, LLM vulnerabilities and post‑quantum encryption readiness. Independent ISO 9001 and...

By Help Net Security
OPNsense 26.1 Brings Updates to Open-Source Firewall Management
News•Jan 28, 2026

OPNsense 26.1 Brings Updates to Open-Source Firewall Management

OPNsense released version 26.1, code‑named Witty Woodpecker, enhancing firewall management, traffic visibility, and automation interfaces. The update revamps the live firewall log, redesigns the firewall rules UI, and expands API coverage to include Source NAT tagging and Destination NAT port...

By Help Net Security
Veracode’s Platform Enhancements Help Prevent Software Supply Chain Attacks
News•Jan 28, 2026

Veracode’s Platform Enhancements Help Prevent Software Supply Chain Attacks

Veracode unveiled a suite of platform enhancements for the second half of 2025, highlighted by the launch of Package Firewall, a preventive control that blocks malicious third‑party packages before they enter development environments. The feature integrates with major package managers...

By Help Net Security
N8n Adds Chat Hub to Centralize AI Access Inside Automation Workflows
News•Jan 28, 2026

N8n Adds Chat Hub to Centralize AI Access Inside Automation Workflows

n8n launched Chat Hub, a built‑in chat interface that lets users query large language models and trigger workflow agents without exposing workflow logic or credentials. The feature introduces a dedicated Chat role, centralizes model and credential management, and supports both...

By Help Net Security
McAfee Upgrades Scam Detector to Spot QR Code Scams and Suspicious Messages
News•Jan 28, 2026

McAfee Upgrades Scam Detector to Spot QR Code Scams and Suspicious Messages

McAfee has upgraded its Scam Detector tool to include instant QR‑code safety checks and enhanced detection of suspicious direct messages, even when they contain no links. The update comes as QR‑code scams affect 68 % of recent scanners, with 18 % encountering...

By Help Net Security
Cloudbrink Adds AI Innovations to Its Platform to Protect Agents, Apps, and Data
News•Jan 28, 2026

Cloudbrink Adds AI Innovations to Its Platform to Protect Agents, Apps, and Data

Cloudbrink announced new AI‑focused security features that extend its secure connectivity platform to protect AI agents, browser‑based AI services, and custom large language models. The enhancements include a Safe AI BrinkAgent that detects data leaks, a continuously updated definitions database...

By Help Net Security
Fortinet Expands FortiCNAPP with Network, Data, and Runtime-Aware Risk Prioritization
News•Jan 28, 2026

Fortinet Expands FortiCNAPP with Network, Data, and Runtime-Aware Risk Prioritization

Fortinet has upgraded its FortiCNAPP platform to incorporate network enforcement, data security posture management, and runtime validation into a single risk‑prioritization workflow. The enhancements enable network‑aware risk scoring, in‑place data sensitivity analysis, and runtime‑informed prioritization, reducing alert fatigue and focusing...

By Help Net Security
Yubico Extends Hardware Passkey Deployment Options
News•Jan 28, 2026

Yubico Extends Hardware Passkey Deployment Options

Yubico has broadened its YubiKey as a Service offering by adding self‑service ordering and a revamped Customer Portal. The new workflow lets employees and partners select YubiKey models, enter shipping details, and receive keys directly in the U.S., Canada or...

By Help Net Security
Volante’s Multi-Cloud Resiliency Service Keeps Payments Running During Cloud Outages
News•Jan 28, 2026

Volante’s Multi-Cloud Resiliency Service Keeps Payments Running During Cloud Outages

Volante Technologies has introduced a Multi‑cloud Resiliency Service designed to keep payment processing operational when a primary cloud provider experiences an outage. The solution offers rapid, zero‑data‑loss failover to a secondary cloud environment, eliminating single‑provider dependency for banks and other...

By Help Net Security
Pondurance RansomSnare Blocks File Encryption and Data Exfiltration
News•Jan 28, 2026

Pondurance RansomSnare Blocks File Encryption and Data Exfiltration

Pondurance has added RansomSnare, a new module to its Managed Detection and Response (MDR) service that halts ransomware the moment it tries to encrypt a file. The capability terminates the malicious process instantly, blocking both encryption and data exfiltration without...

By Help Net Security
CERT UEFI Parser: Open-Source Tool Exposes UEFI Architecture to Uncover Vulnerabilities
News•Jan 28, 2026

CERT UEFI Parser: Open-Source Tool Exposes UEFI Architecture to Uncover Vulnerabilities

The Software Engineering Institute at Carnegie Mellon University released the CERT UEFI Parser, an open‑source utility that statically parses UEFI firmware binaries and source code into a structured, machine‑readable model. By extracting modules, execution phases, protocols and dependencies, the tool gives...

By Help Net Security
Why Prevention-First Secrets Security Will Define Enterprise Scale: Learnings From a Leading Telecom
News•Jan 28, 2026

Why Prevention-First Secrets Security Will Define Enterprise Scale: Learnings From a Leading Telecom

Orange Business discovered that traditional secret detection tools generate massive false positives, leading developers to ignore alerts. By implementing mandatory GitLab pre‑receive hooks and a three‑layer defense, they reduced new secret leaks by 80% while keeping false positives below 5%....

By Help Net Security
Grammarly and QuillBot Are Among Widely Used Chrome Extensions Facing Serious Privacy Questions
News•Jan 28, 2026

Grammarly and QuillBot Are Among Widely Used Chrome Extensions Facing Serious Privacy Questions

Incogni’s 2026 privacy risk report examined 442 AI‑powered Chrome extensions and found that over half collect user data, often with deep‑level permissions. The study highlighted that scripting and activeTab permissions let extensions read and modify any web page, exposing emails,...

By Help Net Security
Audits for AI Systems that Keep Changing
News•Jan 28, 2026

Audits for AI Systems that Keep Changing

ETSI released TS 104 008, a continuous‑auditing based conformity assessment (CABCA) specification for AI systems. It shifts assurance from periodic reviews to ongoing cycles that automatically collect evidence from logs, model parameters, and data samples. The framework operationalizes regulatory requirements into machine‑readable...

By Help Net Security
Tenable One AI Exposure Delivers Unified Visibility and Governance Across AI, Cloud and SaaS
News•Jan 27, 2026

Tenable One AI Exposure Delivers Unified Visibility and Governance Across AI, Cloud and SaaS

Tenable has made its Tenable One AI Exposure product generally available, extending the Tenable One Exposure Management Platform to provide unified visibility, discovery, and governance of AI assets across SaaS, cloud, APIs and on‑premises agents. The solution continuously identifies both...

By Help Net Security
NICE Actimize Insights Network Combats Fraudulent Transfers
News•Jan 27, 2026

NICE Actimize Insights Network Combats Fraudulent Transfers

NICE Actimize introduced the Actimize Insights Network, a real‑time intelligence platform that aggregates counterparty risk data across financial institutions. The network leverages the company’s fraud and financial‑crime expertise to deliver cross‑channel, millisecond‑level risk signals for authorized push‑payment scams, BEC and...

By Help Net Security
HackerOne Brings Agentic PTaaS to Continuous, Expert-Validated Pentesting
News•Jan 27, 2026

HackerOne Brings Agentic PTaaS to Continuous, Expert-Validated Pentesting

HackerOne has launched Agentic Pentest as a Service (Agentic PTaaS), a hybrid AI‑human offering that delivers continuous, real‑world exploit validation at enterprise scale. The solution pairs proprietary AI agents with a vetted community of elite pentesters to automate reconnaissance, exploitation and...

By Help Net Security
Claroty Secures $150M Series F Funding Led by Golub Growth
Deals•Jan 22, 2026

Claroty Secures $150M Series F Funding Led by Golub Growth

Claroty announced a $150 million Series F round led by Golub Growth, an affiliate of Golub Capital, with existing investors contributing up to $50 million. The capital will fund global expansion and further development of its cyber‑physical systems protection platform.

Help Net Security
Cyera Raises $400M in Series F Round, Valuation Hits $9B
Deals•Jan 8, 2026

Cyera Raises $400M in Series F Round, Valuation Hits $9B

Cyera announced a $400 million Series F funding round, bringing total funding to over $1.7 billion and valuing the company at $9 billion. The round was led by Blackstone funds and included participation from existing investors such as Accel, Coatue, Sequoia Capital...

Help Net Security

Page 3 of 5

← Prev12345Next →