Help Net Security - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
Help Net Security

Help Net Security

Publication
0 followers

Established cybersecurity portal providing daily news and expert security advisories.

Recent Posts

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities
Deals•Feb 5, 2026

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities

Varonis announced the acquisition of AI security startup AllTrue.ai, adding real‑time visibility and enforcement for AI systems to its data security platform. The deal expands Varonis’ capabilities in AI‑TRiSM, helping organizations monitor and control AI models, agents, and data access. Financial terms were not disclosed.

Help Net Security
Microsoft Brings AI-Powered Investigations to Security Teams
News•Jan 27, 2026

Microsoft Brings AI-Powered Investigations to Security Teams

Microsoft has made its Purview Data Security Investigations tool generally available, embedding generative AI to streamline breach, fraud, and content investigations across Microsoft 365. The solution pulls data from emails, Teams, documents, and Copilot, allowing natural‑language searches that group related artifacts...

By Help Net Security
AWS Adds IPv6 Support to IAM Identity Center Through Dual-Stack Endpoints
News•Jan 27, 2026

AWS Adds IPv6 Support to IAM Identity Center Through Dual-Stack Endpoints

Amazon Web Services announced IPv6 support for its IAM Identity Center by introducing dual‑stack endpoints that accept both IPv4 and IPv6 traffic. The new URLs apply to user access portals, administrative APIs, and managed applications, while existing IPv4‑only endpoints continue...

By Help Net Security
NETSCOUT Adds Wi-Fi 7 Observability and Real-Time SSL Certificate Monitoring
News•Jan 27, 2026

NETSCOUT Adds Wi-Fi 7 Observability and Real-Time SSL Certificate Monitoring

NETSCOUT unveiled new nGeniusONE enhancements that add Wi‑Fi 7 deep packet inspection to its Edge Sensors and introduce real‑time SSL/TLS certificate monitoring. The Wi‑Fi 7 support, backward compatible with Wi‑Fi 6E/6/5, closes observability gaps in remote sites as the market is projected to...

By Help Net Security
Descope Introduces Dedicated Identity Infrastructure for AI Agents and MCP Ecosystems
News•Jan 27, 2026

Descope Introduces Dedicated Identity Infrastructure for AI Agents and MCP Ecosystems

Descope has launched an upgraded Agentic Identity Hub that treats AI agents as first‑class identities alongside human users. The platform adds OAuth 2.1, PKCE, DCR, CIMD and tool‑level scopes to MCP servers, letting developers secure agent access with enterprise‑grade policies. It...

By Help Net Security
When Open Science Meets Real-World Cybersecurity
News•Jan 27, 2026

When Open Science Meets Real-World Cybersecurity

Fermilab CISO Matthew Kwiatkowski explains how open‑science environments create cybersecurity blind spots when scientists design infrastructure without early security input. He notes that collaboration between IT and researchers reduces risky implementations and that publicly releasable data is often mislabeled, prompting...

By Help Net Security
Waiting for AI Superintelligence? Don’t Hold Your Breath
News•Jan 27, 2026

Waiting for AI Superintelligence? Don’t Hold Your Breath

AI superintelligence remains a theoretical goal, yet artificial intelligence is already woven into the fabric of enterprise operations, accelerating decision‑making and threat detection. Companies report faster, more accurate alert investigations, but the same speed introduces novel vulnerabilities and operational risks....

By Help Net Security
Cybersecurity Jobs Available Right Now: January 27, 2026
News•Jan 27, 2026

Cybersecurity Jobs Available Right Now: January 27, 2026

A wave of cybersecurity openings posted on January 27, 2026 spans senior leadership, engineering, and analyst roles across the United States, Europe, Asia, and the Middle East. Companies such as micro1, Bringg, Oracle, and Snyk are hiring C‑level executives, incident‑response...

By Help Net Security
Ivanti Expands Neurons Platform with Agentic AI and Autonomous Endpoint Management
News•Jan 27, 2026

Ivanti Expands Neurons Platform with Agentic AI and Autonomous Endpoint Management

Ivanti announced a major upgrade to its Neurons platform, adding Agentic AI‑driven personas to the IT Service Management suite, autonomous endpoint management (AEM) that unifies DEX, UEM and security, and enhanced asset visibility through Discovery. The Agentic AI preview launches...

By Help Net Security
Upwind Secures $250 Million to Expand Runtime-First Cloud Security for AI Workloads
News•Jan 26, 2026

Upwind Secures $250 Million to Expand Runtime-First Cloud Security for AI Workloads

Upwind announced a $250 million Series B round, bringing total capital to $430 million. The funding, led by Bessemer Venture Partners with participation from Salesforce Ventures and Picture Capital, will accelerate the company’s runtime‑first cloud security platform aimed at AI‑driven workloads. Upwind claims...

By Help Net Security
Booz Allen’s Vellox Reverser Accelerates Malware Analysis and Threat Intelligence
News•Jan 26, 2026

Booz Allen’s Vellox Reverser Accelerates Malware Analysis and Threat Intelligence

Booz Allen Hamilton has launched the general availability of Vellox Reverser, an AI‑driven malware reverse‑engineering platform. The solution leverages a resilient agentic AI architecture on AWS Lambda, Bedrock, and Step Functions to automate deep analysis of complex threats. New features...

By Help Net Security
Stellar Cyber Expands Autonomous SOC Capabilities with Agentic AI
News•Jan 26, 2026

Stellar Cyber Expands Autonomous SOC Capabilities with Agentic AI

Stellar Cyber unveiled version 6.3, embedding agentic AI to push its Autonomous SOC vision forward. The update automates threat detection, investigation, triage and response across identity, network, endpoint, email and cloud layers, slashing alert fatigue and mean‑time‑to‑respond. New Model Context Protocol...

By Help Net Security
Quantum Computing Firm IonQ Acquires US Semiconductor Firm SkyWater for $1.8 Billion
News•Jan 26, 2026

Quantum Computing Firm IonQ Acquires US Semiconductor Firm SkyWater for $1.8 Billion

IonQ announced a definitive agreement to acquire SkyWater Technology for $35 per share, valuing the semiconductor foundry at roughly $1.8 billion in a cash‑and‑stock transaction. The deal creates a vertically integrated quantum platform that combines IonQ’s fault‑tolerant quantum processors with SkyWater’s...

By Help Net Security
Microsoft Entra ID Will Auto-Enable Passkey Profiles, Synced Passkeys
News•Jan 26, 2026

Microsoft Entra ID Will Auto-Enable Passkey Profiles, Synced Passkeys

Microsoft Entra ID will automatically enable passkey profiles and add synced passkey support starting March 2026. The update moves passkey profiles to general availability and introduces a new passkeyType property that lets admins choose device‑bound, synced, or both types of passkeys....

By Help Net Security
Inside Microsoft’s Veteran-to-Tech Workforce Pipeline
News•Jan 26, 2026

Inside Microsoft’s Veteran-to-Tech Workforce Pipeline

Microsoft’s Military Affairs team has expanded the Software and Systems Academy (MSSA) into a nationwide veteran‑to‑tech pipeline, graduating more than 4,000 service members since its 2013 pilot. The program now offers three core learning paths—cloud development, cloud administration, and cybersecurity...

By Help Net Security
Firewalla Outlines a Zero Trust Approach to Fixing Flat Home Networks
News•Jan 26, 2026

Firewalla Outlines a Zero Trust Approach to Fixing Flat Home Networks

Firewalla introduced a zero‑trust, microsegmentation approach that lets homeowners modernize large, flat Wi‑Fi networks without renumbering IP addresses or reconfiguring devices. Using the AP7 and Orange appliances, users can keep existing SSIDs while automatically isolating legacy IoT, newer smart devices,...

By Help Net Security
Brakeman: Open-Source Vulnerability Scanner for Ruby on Rails Applications
News•Jan 26, 2026

Brakeman: Open-Source Vulnerability Scanner for Ruby on Rails Applications

Brakeman is an open‑source static analysis scanner that inspects Ruby on Rails codebases for security flaws without executing the application. It evaluates controllers, models, views, templates, and dependency versions, flagging injection, XSS, unsafe redirects, and authentication weaknesses. The tool integrates...

By Help Net Security
Incident Response Lessons Learned the Hard Way
News•Jan 26, 2026

Incident Response Lessons Learned the Hard Way

Ryan Seymour, VP of Consulting and Education at ConnectSecure, draws on over twenty years of incident‑response work to explain why many failures begin before an attack even starts. He shows that teams often hesitate when alerts appear, not because of...

By Help Net Security
AWS Releases Updated PCI PIN Compliance Report for Payment Cryptography
News•Jan 26, 2026

AWS Releases Updated PCI PIN Compliance Report for Payment Cryptography

Amazon Web Services has released an updated PCI PIN compliance package for its Payment Cryptography service, confirming a recent third‑party audit with zero findings. The package includes a PCI PIN Attestation of Compliance and a Responsibility Summary that outlines customer obligations. The...

By Help Net Security
Elastic Agent Builder Expands How Developers Build Production-Ready AI Agents
News•Jan 23, 2026

Elastic Agent Builder Expands How Developers Build Production-Ready AI Agents

Elastic has launched the general availability of Agent Builder, a platform that lets developers create secure, context‑driven AI agents in minutes by leveraging Elasticsearch’s unified search and analytics capabilities. The offering includes native data preparation, retrieval, ranking, custom tools, conversational...

By Help Net Security
Ring Now Lets Users Verify Whether Videos Have Been Altered
News•Jan 23, 2026

Ring Now Lets Users Verify Whether Videos Have Been Altered

Ring has launched Ring Verify, a built‑in authenticity feature that embeds a digital security seal in every video recorded after December 2025. The seal automatically breaks if the footage is trimmed, re‑encoded, or otherwise altered, and users can check verification status...

By Help Net Security
Iboss Unveils AI-Powered SSPM Capability to Reduce SaaS Risk
News•Jan 23, 2026

Iboss Unveils AI-Powered SSPM Capability to Reduce SaaS Risk

iboss introduced an AI‑powered SaaS Security Posture Management (SSPM) capability within its Zero Trust SASE platform. The solution connects to SaaS apps via native APIs, continuously scanning configurations, permissions and data exposure. AI analysis prioritizes misconfigurations and risky sharing, presenting...

By Help Net Security
Microsoft Introduces Winapp, an Open-Source CLI for Building Windows Apps
News•Jan 23, 2026

Microsoft Introduces Winapp, an Open-Source CLI for Building Windows Apps

Microsoft has launched winapp, an open‑source command‑line interface designed to simplify Windows application development. The tool consolidates SDK management, manifest editing, certificate generation, and packaging into unified commands, supporting project scaffolding, dependency handling, and build/run operations. Winapp integrates with Visual...

By Help Net Security
Energy Sector Orgs Targeted with AiTM Phishing Campaign
News•Jan 22, 2026

Energy Sector Orgs Targeted with AiTM Phishing Campaign

Microsoft has identified a sophisticated AiTM phishing campaign targeting energy‑sector organizations. Attackers use compromised trusted email accounts to send “NEW PROPOSAL – NDA” messages containing a malicious SharePoint link that leads to a fake login page. The page captures credentials...

By Help Net Security
Claroty Raises $150 Million to Advance Global CPS Protection Platform
News•Jan 22, 2026

Claroty Raises $150 Million to Advance Global CPS Protection Platform

Claroty announced a $150 million Series F round led by Golub Growth, with existing investors contributing up to an additional $50 million. The capital will fund both organic and inorganic expansion of its cyber‑physical systems (CPS) protection platform. Claroty positions the funding as...

By Help Net Security
OpenWrt One Gains Support for Running Debian
News•Jan 22, 2026

OpenWrt One Gains Support for Running Debian

Debian now runs on the OpenWrt One router hardware. Engineers added low‑level platform support, bootloader tweaks, and system initialization scripts to enable Debian to boot directly without abstraction layers. The OpenWrt One serves as a reference device for the OpenWrt...

By Help Net Security
EaseUS Disk Copy 7.0.0 Enables Backup, Restore, and Migration without Multiple Drives Connected
News•Jan 22, 2026

EaseUS Disk Copy 7.0.0 Enables Backup, Restore, and Migration without Multiple Drives Connected

EaseUS released Disk Copy 7.0.0, adding full disk‑imaging capabilities to its previously cloning‑only tool. Users can now create compressed image files, store them independently, and restore them to physical or virtual disks without needing both drives connected. The update also...

By Help Net Security
Unbounded AI Use Can Break Your Systems
News•Jan 22, 2026

Unbounded AI Use Can Break Your Systems

James Wickett, CEO of DryRun Security, warns that organizations are rapidly embedding large‑language‑model (LLM) features into live products without adequate safeguards. He highlights the danger of AI‑generated code being trusted for critical business logic and access control. The video stresses...

By Help Net Security
MacOS Tahoe Improves Privacy and Communication Safety
News•Jan 22, 2026

MacOS Tahoe Improves Privacy and Communication Safety

Apple’s macOS Tahoe introduces a suite of privacy‑focused features that screen unwanted calls, messages, and online tracking. Native Phone, Messages and FaceTime now offer system‑level unknown‑contact controls, while Safari extends Advanced Fingerprinting Protection to every browsing session. Parental tools let...

By Help Net Security
Claroty Secures $150M Series F Funding Led by Golub Growth
Deals•Jan 22, 2026

Claroty Secures $150M Series F Funding Led by Golub Growth

Claroty announced a $150 million Series F round led by Golub Growth, an affiliate of Golub Capital, with existing investors contributing up to $50 million. The capital will fund global expansion and further development of its cyber‑physical systems protection platform.

Help Net Security
Microsoft Updates the Security Baseline for Microsoft 365 Apps for Enterprise
News•Jan 21, 2026

Microsoft Updates the Security Baseline for Microsoft 365 Apps for Enterprise

Microsoft has released security baseline version 2512 for Microsoft 365 Apps for enterprise, providing recommended policy settings across Word, Excel, PowerPoint, Outlook, and Access. The baseline addresses macros, add‑ins, ActiveX, Protected View, and update behavior, and is delivered as Group Policy objects...

By Help Net Security
Check Point Exposure Management Unifies Threat Intelligence, Context, and Remediation
News•Jan 21, 2026

Check Point Exposure Management Unifies Threat Intelligence, Context, and Remediation

Check Point unveiled Exposure Management, a platform that fuses threat intelligence, vulnerability prioritization, and automated remediation into a single workflow. The solution offers real‑time situational awareness by correlating dark‑web insights, exploitability context, and attack‑surface visibility. It integrates with more than...

By Help Net Security
Cohesity Enhances Identity Resilience with ITDR Capabilities
News•Jan 21, 2026

Cohesity Enhances Identity Resilience with ITDR Capabilities

Cohesity has introduced Identity Threat Detection and Response (ITDR) capabilities, extending its Identity Resilience suite to protect Active Directory and Microsoft Entra ID. The solution continuously monitors identity posture, flags risky changes, and detects attack patterns before an incident. During...

By Help Net Security
Vectra AI Helps Organizations Prevent AI-Powered Cyberattacks
News•Jan 21, 2026

Vectra AI Helps Organizations Prevent AI-Powered Cyberattacks

Vectra AI unveiled a next‑generation platform designed to safeguard the emerging AI enterprise, where machine‑speed workloads span on‑premises, multi‑cloud, SaaS, IoT and edge environments. The solution delivers unified observability, automatically discovers AI agents as first‑class identities, and uses behavior‑driven AI...

By Help Net Security
Rust Package Registry Adds Security Tools and Metrics to crates.io
News•Jan 21, 2026

Rust Package Registry Adds Security Tools and Metrics to crates.io

The Rust package registry crates.io has introduced a Security tab that surfaces RustSec advisories and flags vulnerable versions on each crate page. Publishing workflows were enhanced with Trusted Publishing support for GitLab CI/CD, enabling OIDC‑based authentication without long‑lived tokens. New...

By Help Net Security
Linux Users Targeted by Crypto Thieves via Hijacked Apps on Snap Store
News•Jan 21, 2026

Linux Users Targeted by Crypto Thieves via Hijacked Apps on Snap Store

Security researcher Alan Pope revealed that crypto thieves are hijacking expired domains linked to Snap Store publishers to gain Snapcraft account access and push malicious updates. The attackers replace benign snaps with crypto‑wallet malware that steals recovery phrases via automatic...

By Help Net Security
Cside Targets Hidden Website Privacy Violations with Privacy Watch
News•Jan 21, 2026

Cside Targets Hidden Website Privacy Violations with Privacy Watch

cside unveiled Privacy Watch, an AI‑driven platform that continuously monitors client‑side third‑party scripts for hidden data collection and privacy violations. The tool automatically generates evidence logs and regulation‑specific reports to help organizations meet GDPR, CPRA, HIPAA and emerging state‑level requirements. With...

By Help Net Security
Cybercriminals Speak the Language Young People Trust
News•Jan 21, 2026

Cybercriminals Speak the Language Young People Trust

Criminal networks are systematically recruiting minors through familiar platforms such as TikTok, Instagram, Snapchat and Discord, using encrypted messaging and crypto payments to mask their activities. They speak in coded, game‑like language that makes illegal tasks appear low‑risk and rewarding,...

By Help Net Security
Bandit: Open-Source Tool Designed to Find Security Issues in Python Code
News•Jan 21, 2026

Bandit: Open-Source Tool Designed to Find Security Issues in Python Code

Bandit is an open‑source Python security scanner maintained by the PyCQA community. It parses source files and flags risky patterns such as unsafe eval calls, weak cryptography, hard‑coded credentials, and insecure temporary file handling. Each finding is annotated with severity...

By Help Net Security
The 2026 State of Pentesting: Why Delivery and Follow-Through Matter More than Ever
News•Jan 21, 2026

The 2026 State of Pentesting: Why Delivery and Follow-Through Matter More than Ever

Penetration testing has shifted from static, point‑in‑time reports to continuous, outcome‑driven programs. Modern teams now demand real‑time delivery, automated routing of findings, and closed‑loop validation to reduce risk. Platforms like PlexTrac enable centralized visibility, integration with ticketing tools, and automated...

By Help Net Security
Security Leaders Push for Continuous Controls as Audits Stay Manual
News•Jan 21, 2026

Security Leaders Push for Continuous Controls as Audits Stay Manual

Security and risk teams still rely heavily on manual GRC processes, spending thousands of person‑hours each year collecting evidence and preparing audits. While organizations adopt automation for policy management and evidence gathering, deeper workflow automation and continuous controls monitoring remain...

By Help Net Security
Ping Identity Launches Universal Services for Ongoing Identity Assurance
News•Jan 20, 2026

Ping Identity Launches Universal Services for Ongoing Identity Assurance

Ping Identity introduced Universal Services, a continuous identity assurance suite that extends trust beyond the login event to every digital interaction. The offering integrates with any existing identity provider via standard APIs, allowing enterprises to validate, re‑verify, and adapt protections...

By Help Net Security
Endace Pushes Packet Capture Into Real-Time Security Workflows
News•Jan 20, 2026

Endace Pushes Packet Capture Into Real-Time Security Workflows

Endace released OSm 7.3, a major update that dramatically speeds packet‑capture search and adds a Vault REST API for automated forensic data access. The new search engine delivers up to 50‑fold performance gains, cutting typical query times from nearly a minute...

By Help Net Security
Radware Targets API Blind Spots with Real-Time Lifecycle Protection
News•Jan 20, 2026

Radware Targets API Blind Spots with Real-Time Lifecycle Protection

Radware announced its API Security Service, an end‑to‑end platform that safeguards APIs throughout their entire lifecycle using live production traffic. The solution tackles OWASP Top 10 API risks, including sophisticated Layer 7 DDoS attacks, by delivering continuous discovery, runtime posture management, and...

By Help Net Security
Confusion and Fear Send People to Reddit for Cybersecurity Advice
News•Jan 20, 2026

Confusion and Fear Send People to Reddit for Cybersecurity Advice

Researchers from Google and University College London examined 1.1 billion Reddit posts from 2021‑2024 to map how users seek cybersecurity help. Help‑seeking activity remained steady until a sharp 66 % jump in 2024, topping 100 000 questions per month by August. Scams, account‑access...

By Help Net Security
Keepnet Bets on Agentic AI Behavioral Training to Curb Security Mistakes
News•Jan 19, 2026

Keepnet Bets on Agentic AI Behavioral Training to Curb Security Mistakes

Keepnet introduced Agentic AI for Behavioral Microlearning, shifting training success metrics from completion rates to measurable behavior change and incident reduction. The autonomous platform plans, creates, delivers, and optimizes short, contextual lessons using real‑time risk data, cutting content‑creation time from...

By Help Net Security
British Army to Spend £279 Million on Permanent Cyber Regiment Base
News•Jan 19, 2026

British Army to Spend £279 Million on Permanent Cyber Regiment Base

The British Army will invest £279 million to build a permanent base for its 13 Signal Regiment at Duke of Gloucester Barracks in Gloucestershire. The new facility will house cyber training, operations, and the Army’s Cyber, Information and Security Operations Centre, enhancing...

By Help Net Security
SEON Identity Verification Combines KYC Checks with Real-Time Fraud Intelligence
News•Jan 19, 2026

SEON Identity Verification Combines KYC Checks with Real-Time Fraud Intelligence

SEON introduced an AI‑powered Identity Verification solution that combines document validation, biometric liveness detection, proof‑of‑address checks, and optional government database queries within its unified risk platform. The service draws on more than 900 real‑time fraud signals to evaluate both the...

By Help Net Security
Global Tensions Are Pushing Cyber Activity Toward Dangerous Territory
News•Jan 19, 2026

Global Tensions Are Pushing Cyber Activity Toward Dangerous Territory

Geopolitical rivalries are increasingly manifesting as cyber operations that target critical infrastructure, disinformation networks, and supply‑chain dependencies. Recent incidents—from the Ukrainian power‑grid outage to a Norwegian dam breach—illustrate how state actors can weaponize digital tools against civilian services. AI‑generated disinformation...

By Help Net Security
Rubrik Introduces Security Cloud Sovereign for Data Sovereignty and Regulatory Compliance
News•Jan 19, 2026

Rubrik Introduces Security Cloud Sovereign for Data Sovereignty and Regulatory Compliance

Rubrik unveiled Security Cloud Sovereign, a data‑protection platform that keeps all data, metadata, and control planes inside a customer‑chosen jurisdiction. The solution offers immutable safeguards that prevent encryption, deletion, or alteration even if attackers gain elevated access. Integrated threat‑detection analytics...

By Help Net Security
Cyera Raises $400M in Series F Round, Valuation Hits $9B
Deals•Jan 8, 2026

Cyera Raises $400M in Series F Round, Valuation Hits $9B

Cyera announced a $400 million Series F funding round, bringing total funding to over $1.7 billion and valuing the company at $9 billion. The round was led by Blackstone funds and included participation from existing investors such as Accel, Coatue, Sequoia Capital...

Help Net Security

Page 4 of 5

← Prev12345Next →