Help Net Security

Help Net Security

Publication
0 followers

Established cybersecurity portal providing daily news and expert security advisories.

Zero Networks Kubernetes Access Matrix Exposes Hidden Access Paths and Blast Radius
NewsMar 23, 2026

Zero Networks Kubernetes Access Matrix Exposes Hidden Access Paths and Blast Radius

Zero Networks introduced the Kubernetes Access Matrix, a real‑time visual map that displays every allowed and denied network rule inside Kubernetes clusters. The tool automatically discovers existing network policies and presents namespace‑to‑namespace, application‑to‑application, and workload‑to‑workload connections in a single matrix....

By Help Net Security
Booz Allen’s Vellox Brings AI Vs. AI Defense to Protect Critical Infrastructure and National Security
NewsMar 23, 2026

Booz Allen’s Vellox Brings AI Vs. AI Defense to Protect Critical Infrastructure and National Security

Booz Allen Hamilton unveiled Vellox, an AI‑native cyber‑defense suite designed to counter AI‑driven attacks that now breach enterprises in minutes. The company’s threat report shows breach dwell time fell below 30 minutes in 2025, with some incidents resolved in seconds....

By Help Net Security
Your AI Agents Are Moving Sensitive Data. Do You Know Where?
NewsMar 23, 2026

Your AI Agents Are Moving Sensitive Data. Do You Know Where?

In a Help Net Security interview, Bonfy.AI CEO Gidi Cohen warns that the greatest threat from autonomous AI agents is data‑layer risk, not traditional prompt‑injection attacks. He outlines Bonfy's three‑pronged approach: controlling grounding data, monitoring content across tool calls and...

By Help Net Security
Plumber: Open-Source Scanner of GitLab CI/CD Pipelines for Compliance Gaps
NewsMar 23, 2026

Plumber: Open-Source Scanner of GitLab CI/CD Pipelines for Compliance Gaps

Plumber is an open‑source Go tool that scans GitLab CI/CD pipelines for compliance gaps such as mutable container tags, unprotected branches, and outdated templates. It reads the .gitlab-ci.yml file and queries the GitLab API, offering eight configurable controls via a...

By Help Net Security
NIST Updates Its DNS Security Guidance for the First Time in over a Decade
NewsMar 23, 2026

NIST Updates Its DNS Security Guidance for the First Time in over a Decade

NIST released SP 800‑81r3, the first major update to its Secure Domain Name System Deployment Guide in over twelve years. The revision emphasizes protective DNS, encrypted DNS protocols (DoT, DoH, DoQ), and modern DNSSEC algorithms such as ECDSA and Ed25519. It...

By Help Net Security
Rapid7 Enhances Exposure Command with Runtime Validation and DSPM for Risk Analysis
NewsMar 20, 2026

Rapid7 Enhances Exposure Command with Runtime Validation and DSPM for Risk Analysis

Rapid7 has added runtime validation and Data Security Posture Management (DSPM) to its Exposure Command platform, turning continuous assessment into continuous validation. The new features use eBPF‑based sensors and AI to identify which cloud vulnerabilities and misconfigurations are actively exploitable...

By Help Net Security
Semgrep Multimodal Brings AI Reasoning and Rule-Based Analysis to Code Security
NewsMar 20, 2026

Semgrep Multimodal Brings AI Reasoning and Rule-Based Analysis to Code Security

Semgrep unveiled Multimodal, a hybrid system that merges its deterministic Pro engine with large‑language‑model reasoning to boost code‑security detection. The solution claims up to eight times more true positives and a 50% reduction in noise compared with LLM‑only scans, already...

By Help Net Security
ConductorOne Unveils AI Access Management to Accelerate Secure, Compliant AI Adoption
NewsMar 20, 2026

ConductorOne Unveils AI Access Management to Accelerate Secure, Compliant AI Adoption

ConductorOne launched AI Access Management, a unified control plane that governs access to AI tools, agents, and managed connectivity points across enterprises. The solution lets employees request AI services and be provisioned in under 60 seconds while IT retains full...

By Help Net Security
Bonfy ACS 2.0 Helps Organizations Control Data Use in AI Environments
NewsMar 20, 2026

Bonfy ACS 2.0 Helps Organizations Control Data Use in AI Environments

Bonfy.AI unveiled Bonfy Adaptive Content Security (ACS) 2.0, a platform that extends enterprise data protection to AI agents, copilots, and generative applications across cloud, SaaS, and on‑premises environments. The solution adds real‑time, context‑aware controls—including a data‑in‑use guardrail, browser extension for...

By Help Net Security
Dropzone AI Releases Autonomous Threat Hunting Agent for Continuous SOC Detection
NewsMar 18, 2026

Dropzone AI Releases Autonomous Threat Hunting Agent for Continuous SOC Detection

Dropzone AI unveiled its AI Threat Hunter, an autonomous agent that conducts continuous threat‑hunting across an organization’s security stack. The tool offers one‑click access to 250+ pre‑built hunt packs or custom objectives, completing federated searches in 60‑90 minutes that would...

By Help Net Security
Backslash Adds Cross-Product Support to Secure AI Skills in Developer Environments
NewsMar 18, 2026

Backslash Adds Cross-Product Support to Secure AI Skills in Developer Environments

Backslash Security announced cross‑product support for agentic AI Skills, giving organizations the ability to discover, assess, and govern Skills across AI‑native development environments. The new capability adds centralized visibility of Skills, Model Context Protocol servers, plug‑ins and prompt rules, allowing...

By Help Net Security
Menlo Security Delivers Unified Governance and Threat Prevention for AI Agents and Humans
NewsMar 18, 2026

Menlo Security Delivers Unified Governance and Threat Prevention for AI Agents and Humans

Menlo Security introduced a Browser Security Platform designed to protect both human users and autonomous AI agents that operate within the browser, now treated as the enterprise operating system. The solution embeds a unified control plane that enforces machine‑speed governance,...

By Help Net Security
Graylog Advances Explainable AI and Automated Workflows for Faster Threat Detection
NewsMar 18, 2026

Graylog Advances Explainable AI and Automated Workflows for Faster Threat Detection

Graylog announced AI‑driven security automation at RSA, introducing explainable AI threat prioritization, agentic workflows via its open MCP Server, and a Spring 2026 release that auto‑launches investigations when asset risk exceeds thresholds. The threat prioritization engine aggregates alerts using entity context,...

By Help Net Security
Firefox Is Getting a Free Built-In VPN
NewsMar 18, 2026

Firefox Is Getting a Free Built-In VPN

Mozilla announced that Firefox 149, releasing on March 24, will embed a free built‑in VPN. The service will route browser traffic through a proxy, masking users' IP addresses, and initially provides 50 GB of data per month to users in the United States,...

By Help Net Security
Corelight’s Agentic Triage Turns SOC Alerts Into Evidence-Backed Investigations
NewsMar 18, 2026

Corelight’s Agentic Triage Turns SOC Alerts Into Evidence-Backed Investigations

Corelight unveiled Agentic AI capabilities for security operations centers, highlighted by Agentic Triage—a GenAI‑driven workflow that consolidates alerts into entity‑centric investigations and delivers evidence‑backed verdicts up to ten times faster. The solution exposes every playbook step, query, and data point,...

By Help Net Security
TrojAI Unveils New Capabilities to Secure Agentic AI Beyond the Prompt Layer
NewsMar 18, 2026

TrojAI Unveils New Capabilities to Secure Agentic AI Beyond the Prompt Layer

TrojAI introduced three major capabilities to protect enterprise‑grade agentic AI, extending security beyond the prompt layer. The new Agent‑Led AI Red Teaming automates multi‑turn attacks using coordinated autonomous agents and maps findings to OWASP, MITRE and NIST frameworks. Agent Runtime...

By Help Net Security
Polygraf AI Launches Desktop Overlay for Real-Time AI Behavior Control in Enterprise Operations
NewsMar 18, 2026

Polygraf AI Launches Desktop Overlay for Real-Time AI Behavior Control in Enterprise Operations

Polygraf AI unveiled Desktop Overlay, a real‑time compliance assistant that monitors user input at the desktop level. The edge‑deployed overlay flags sensitive information within 100 ms using on‑premise small language models, requiring only modest CPU and memory resources. Pilot results showed...

By Help Net Security
Stellar Cyber 6.4.0 Reduces Alert Noise and Speeds Investigations with Autonomous SOC Capabilities
NewsMar 16, 2026

Stellar Cyber 6.4.0 Reduces Alert Noise and Speeds Investigations with Autonomous SOC Capabilities

Stellar Cyber has released version 6.4.0, adding autonomous SOC capabilities that automate alert triage and generate AI‑driven case summaries. The platform promises 60‑80% analyst time savings and up to 70% reduction in alert noise through its Agentic AI and Verdict...

By Help Net Security
Fingerprint’s MCP Server Turns Device Intelligence Into Real-Time AI-Powered Fraud Insights
NewsMar 16, 2026

Fingerprint’s MCP Server Turns Device Intelligence Into Real-Time AI-Powered Fraud Insights

Fingerprint has launched an open‑source Model Context Protocol (MCP) Server that lets any AI assistant or chatbot query its device‑intelligence platform in real time. The server uses the open MCP standard, enabling fraud analysts to ask natural‑language questions—such as device...

By Help Net Security
Microsoft Edge 146 Adds IP Privacy and Local Network Access Controls
NewsMar 16, 2026

Microsoft Edge 146 Adds IP Privacy and Local Network Access Controls

Microsoft released Edge 146 stable on March 13, 2026, adding tracking protection changes, IP privacy via Private IP routing, and new enterprise network security policies. InPrivate windows now inherit the standard tracking prevention level, removing the separate setting. The update...

By Help Net Security
KEEQuant Advances Chip-Scale QKD for Telecom, Data Centers, and Critical Infrastructure
NewsMar 16, 2026

KEEQuant Advances Chip-Scale QKD for Telecom, Data Centers, and Critical Infrastructure

KEEQuant unveiled a commercial chip‑scale quantum key distribution (QKD) system that replaces traditional bulk optics with photonic integrated circuits. The miniaturized solution lowers hardware costs and simplifies deployment, making quantum‑safe key exchange viable for telecom operators, data‑center providers, and critical‑infrastructure...

By Help Net Security
45,000 Malicious IP Addresses Taken Down, 94 Suspects Arrested
NewsMar 16, 2026

45,000 Malicious IP Addresses Taken Down, 94 Suspects Arrested

Operation Synergia III, an INTERPOL‑led international effort running from July 2025 to January 2026, dismantled more than 45,000 malicious IP addresses and servers used for phishing, malware, and ransomware. The crackdown resulted in 94 arrests, with another 110 suspects under investigation, and the seizure...

By Help Net Security
JSOC IT’s AUTOPSY Platform Puts Security Stacks Under Live API Verification
NewsMar 16, 2026

JSOC IT’s AUTOPSY Platform Puts Security Stacks Under Live API Verification

JSOC IT launched AUTOPSY, a security verification platform that uses live API integrations to assess an organization’s security stack before a breach occurs. Its flagship product, READY, replaces self‑reported questionnaires with telemetry‑based scores across more than 24 security tools, revealing...

By Help Net Security
Accertify’s Attack State Targets Credential Stuffing and ATO Attacks
NewsMar 13, 2026

Accertify’s Attack State Targets Credential Stuffing and ATO Attacks

Accertify introduced Attack State, a new module within its Account Protection suite that continuously monitors login activity to spot coordinated credential‑stuffing and account‑takeover attacks. By benchmarking real‑time behavior against an organization’s typical traffic patterns, the tool flags anomalies across web,...

By Help Net Security
Red Access Firewall-Native SSE Adds GenAI Security and Browser Protection to Existing Firewalls
NewsMar 13, 2026

Red Access Firewall-Native SSE Adds GenAI Security and Browser Protection to Existing Firewalls

Red Access unveiled a firewall‑native Security Service Edge (SSE) that sits atop any existing firewall without agents, instantly delivering GenAI‑driven security, data loss prevention, CASB, and browser isolation. The solution is vendor‑agnostic, supporting Palo Alto Networks, Fortinet, Cisco and Check...

By Help Net Security
AI Coding Agents Keep Repeating Decade-Old Security Mistakes
NewsMar 13, 2026

AI Coding Agents Keep Repeating Decade-Old Security Mistakes

Researchers evaluated three leading AI coding agents—Claude Code, OpenAI Codex, and Google Gemini—by tasking them with building two real‑world applications from scratch. Across 30 pull requests and 38 security scans, 143 vulnerabilities were found, with 87 % of PRs containing at...

By Help Net Security
Passwords, MFA, and Why neither Is Enough
NewsMar 13, 2026

Passwords, MFA, and Why neither Is Enough

The article argues that traditional passwords and even multi‑factor authentication (MFA) no longer provide sufficient protection against modern credential attacks. It highlights how SMS codes can be intercepted via SIM swapping, authenticator apps are prone to replay and push‑bombing attacks,...

By Help Net Security
€1 Million Online Fraud Scheme Uncovered, Three Suspects Arrested
NewsMar 12, 2026

€1 Million Online Fraud Scheme Uncovered, Three Suspects Arrested

German and French authorities dismantled a cross‑border fraud ring that stole roughly €1 million. Coordinated by Eurojust, the operation on 10 March led to the arrest of three suspects, with the alleged mastermind detained in France pending extradition. Investigators seized cryptocurrencies, jewellery...

By Help Net Security
Mimecast Adds AI Investigation and Adaptive Controls to Manage Human Risk
NewsMar 12, 2026

Mimecast Adds AI Investigation and Adaptive Controls to Manage Human Risk

Mimecast unveiled a suite of AI‑driven platform enhancements aimed at curbing human‑related security risk. The rollout adds adaptive security policies that auto‑adjust based on individual risk scores, an AI‑powered Mihra Investigation Agent that accelerates incident analysis, and open‑gateway integrations for...

By Help Net Security
Socure Launch Enables Startups to Deploy Identity Verification and Fraud Controls
NewsMar 12, 2026

Socure Launch Enables Startups to Deploy Identity Verification and Fraud Controls

Socure introduced Socure Launch, a plug‑and‑play identity verification and fraud‑prevention suite built on its RiskOS platform. The service lets developers activate enterprise‑grade risk controls within minutes, bypassing weeks of custom development. It targets early‑stage fintech, crypto, gaming, marketplace and e‑commerce...

By Help Net Security
Zscaler Enhances Data Sovereignty Controls with Regional Processing and Logging
NewsMar 12, 2026

Zscaler Enhances Data Sovereignty Controls with Regional Processing and Logging

Zscaler announced a global expansion of its data‑sovereignty controls, adding dedicated control and logging planes in six regions and preparing a deployment in Canada. The Zero Trust Exchange now performs in‑region SSL inspection, malware analysis and offers Private Service Edge...

By Help Net Security
SOC Prime’s DetectFlow Enterprise Moves Threat Detection to the Data Ingestion Layer
NewsMar 12, 2026

SOC Prime’s DetectFlow Enterprise Moves Threat Detection to the Data Ingestion Layer

SOC Prime unveiled DetectFlow Enterprise, a platform that embeds real‑time threat detection directly into the data ingestion layer. By running tens of thousands of Sigma detections on live Kafka streams with Apache Flink, the solution achieves millisecond mean‑time‑to‑detect (MTTD). It...

By Help Net Security
Binary Defense’s NightBeacon Brings AI-Driven Analysis to SOCs
NewsMar 12, 2026

Binary Defense’s NightBeacon Brings AI-Driven Analysis to SOCs

Binary Defense unveiled NightBeacon, an AI‑powered security operations platform embedded directly in its SOC. The system cuts mean time to resolution by roughly 30%, accelerates incident summarization 46%, and boosts the number of incidents analysts can handle per shift by...

By Help Net Security
Codoxo’s Deepfake Detection Identifies AI-Generated Medical Records for Health Plans
NewsMar 12, 2026

Codoxo’s Deepfake Detection Identifies AI-Generated Medical Records for Health Plans

Codoxo has launched Deepfake Detection, an AI‑driven solution that scans medical documentation, diagnostic images and claim context in seconds to flag synthetic or manipulated records. The tool embeds explainable risk scores into payer fraud‑prevention workflows, enabling health plans to intercept...

By Help Net Security
Fortinet Enhances SecOps with Cloud SOC, AI Automation, and Managed Services
NewsMar 10, 2026

Fortinet Enhances SecOps with Cloud SOC, AI Automation, and Managed Services

Fortinet unveiled a suite of SecOps upgrades, highlighted by the preview of FortiSOC—a cloud‑delivered service that fuses analytics, SIEM, SOAR and threat intel into a single platform. The company also expanded its FortiAI engine to deliver agentic automation that can...

By Help Net Security
Microsoft Flips Windows Autopatch to Default Hotpatch Security Updates
NewsMar 10, 2026

Microsoft Flips Windows Autopatch to Default Hotpatch Security Updates

Microsoft will automatically enable hotpatch security updates in Windows Autopatch for eligible devices managed via Intune or the Microsoft Graph API, beginning with the May 2026 security release. Hotpatch, introduced a year ago, lets critical fixes install without a reboot, accelerating...

By Help Net Security
Attackers Use AiTM Phishing Kit, Typosquatted Domains to Hijack AWS Accounts
NewsMar 10, 2026

Attackers Use AiTM Phishing Kit, Typosquatted Domains to Hijack AWS Accounts

Datadog researchers uncovered an AiTM phishing campaign that uses spoofed AWS security alerts and typosquatted domains to harvest AWS console credentials. The attackers operate a live proxy, relaying authentication requests to AWS while stealing usernames, passwords, and MFA codes in...

By Help Net Security
Terra Portal Adds Human-Governed AI to Live Production Pentesting
NewsMar 10, 2026

Terra Portal Adds Human-Governed AI to Live Production Pentesting

Terra Security unveiled Terra Portal, a desktop app that places human‑governed AI at the core of live‑production penetration testing. The tool combines autonomous agents for routine tasks with a Copilot layer for controlled exploitation, shrinking the discovery‑to‑fix timeline from months to...

By Help Net Security
Armadin Secures  $189.9 Million to Counter AI-Driven Cyber Threats
NewsMar 10, 2026

Armadin Secures $189.9 Million to Counter AI-Driven Cyber Threats

Armadin announced a $189.9 million seed and Series A round, the largest combined funding ever in cybersecurity, led by Accel with participation from Google Ventures, Kleiner Perkins, Menlo Ventures, In‑Q‑Tel, 8VC and Ballistic Ventures. The capital will accelerate its AI‑driven platform that...

By Help Net Security
Teen Crew Caught Selling DDoS Attack Tools
NewsMar 10, 2026

Teen Crew Caught Selling DDoS Attack Tools

Poland’s Central Bureau for Combating Cybercrime identified seven minors, aged 12 to 16, who sold software that enables distributed denial‑of‑service (DDoS) attacks. The teenagers targeted high‑traffic sites such as auction platforms, hosting services and booking portals, generating profit from the...

By Help Net Security
This Spy Tool Has Been Quietly Stealing Data for Years
NewsMar 10, 2026

This Spy Tool Has Been Quietly Stealing Data for Years

ESET researchers have uncovered a renewed Sednit campaign that relies on a dual‑implant architecture—BeardShell and the open‑source framework Covenant—each hosted on separate cloud providers for redundancy. The toolkit has been used to conduct long‑term surveillance of Ukrainian military personnel since...

By Help Net Security
Fake Claude Code Install Pages Highlight Rise of “InstallFix” Attacks
NewsMar 9, 2026

Fake Claude Code Install Pages Highlight Rise of “InstallFix” Attacks

Security researchers at Push Security discovered that attackers are publishing counterfeit Anthropic Claude Code installation pages. These look‑alike sites, promoted through paid Google ads, replace legitimate install commands with malicious scripts that download the Amatera stealer on Windows and comparable malware...

By Help Net Security
Turning Expertise Into Opportunity for Women in Cybersecurity
NewsMar 9, 2026

Turning Expertise Into Opportunity for Women in Cybersecurity

SheSpeaksCyber, a free directory launched by the Women4Cyber Foundation, connects event organizers with thousands of qualified women in cybersecurity. The platform targets 1,000 published speaker profiles by 2027 and aims for 50 percent female representation on conference stages by 2030. By...

By Help Net Security
Microsoft Working on Teams Feature to Keep Unauthorized Bots at Bay
NewsMar 6, 2026

Microsoft Working on Teams Feature to Keep Unauthorized Bots at Bay

Microsoft announced a new Teams feature that will let meeting admins identify and control third‑party bots before they join meetings, rolling out in May 2026 across desktop, macOS, Linux, iOS, and Android. The tool displays external bots waiting in the lobby...

By Help Net Security
Hexnode IdP Brings Device-Aware Authentication and Zero Trust to Enterprise Access
NewsMar 6, 2026

Hexnode IdP Brings Device-Aware Authentication and Zero Trust to Enterprise Access

Hexnode has launched Hexnode IdP, a native identity provider embedded within its unified endpoint management (UEM) platform. The solution combines authentication, single sign‑on, MFA and role‑based access with real‑time device posture checks, allowing only compliant devices to access corporate applications....

By Help Net Security
Cyolo PRO 7.0 Expands OT-First Secure Remote Access with AI Session Intelligence
NewsMar 6, 2026

Cyolo PRO 7.0 Expands OT-First Secure Remote Access with AI Session Intelligence

Cyolo has launched Cyolo PRO 7.0, an upgrade that extends its OT‑first secure remote access platform with AI‑driven session intelligence, passive asset and traffic discovery, and a consolidated operational dashboard. The AI engine automatically transcribes session video, categorizing user actions to speed...

By Help Net Security
March 2026 Patch Tuesday Forecast: Is AI Security an Oxymoron?
NewsMar 6, 2026

March 2026 Patch Tuesday Forecast: Is AI Security an Oxymoron?

Developers are increasingly embedding AI into software, but the tools themselves are proving vulnerable, highlighted by Google’s Gemini AI flaw in Chrome (CVE‑2026‑0628) with an 8.8 CVSS score. Malicious AI‑powered browser extensions are also surfacing, harvesting data from unsuspecting users....

By Help Net Security
Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft
NewsMar 6, 2026

Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft

Business email compromise (BEC) and funds transfer fraud (FTF) accounted for 58% of cyber‑insurance claims in 2025, with BEC alone representing 31% of all claims. Average BEC loss fell 28% to $27,000 and FTF loss dropped 14% to $141,000, while...

By Help Net Security
Why Phishing Still Works Today
NewsMar 6, 2026

Why Phishing Still Works Today

Gal Livschitz, senior penetration tester at Terra Security, explains how phishing has become harder to detect by leveraging HTTPS, branded look‑alike domains, and sophisticated delivery methods. He highlights the rise of QR‑based phishing in PDFs, MFA‑fatigue attacks that pressure users...

By Help Net Security