Help Net Security

Help Net Security

Publication
0 followers

Established cybersecurity portal providing daily news and expert security advisories.

Portnox Expands ZTNA with Passwordless Access for RDP, SSH, and Enterprise Consoles
NewsFeb 10, 2026

Portnox Expands ZTNA with Passwordless Access for RDP, SSH, and Enterprise Consoles

Portnox has broadened its zero‑trust network access (ZTNA) platform to include passwordless connectivity for console‑based protocols such as RDP, SSH, VNC and Telnet. The expansion removes credential‑based authentication, a vector behind roughly 80 % of data breaches, while preserving a frictionless...

By Help Net Security
BloodHound Scentry Helps Organizations Reduce Identity Risk and Close Attack Paths
NewsFeb 10, 2026

BloodHound Scentry Helps Organizations Reduce Identity Risk and Close Attack Paths

SpecterOps has launched BloodHound Scentry, a managed service that pairs the BloodHound Enterprise platform with seasoned security practitioners to fast‑track identity attack‑path management (APM). The offering delivers tailored remediation, monthly threat analysis, privilege‑zone design, OpenGraph extensions, and custom reporting, promising...

By Help Net Security
Trojanized 7-Zip Downloads Turn Home Computers Into Proxy Nodes
NewsFeb 10, 2026

Trojanized 7-Zip Downloads Turn Home Computers Into Proxy Nodes

Malwarebytes discovered a trojanized version of the popular 7‑Zip installer that silently adds proxyware payloads, turning compromised home computers into residential proxy nodes. The malicious installer is hosted on a look‑alike domain (7zip.com) and is often reached through erroneous links...

By Help Net Security
Armis Centrix Brings Unified, AI-Driven Application Security to the SDLC
NewsFeb 10, 2026

Armis Centrix Brings Unified, AI-Driven Application Security to the SDLC

Armis introduced Centrix for Application Security, an AI‑driven platform that unifies vulnerability detection across the entire software development lifecycle. The solution scans source code, dependencies, container images and configuration files in unlimited languages, delivering context‑aware insights tied to the CI/CD...

By Help Net Security
DuckDuckGo Enables AI Voice Chat without Saving Voice Data
NewsFeb 10, 2026

DuckDuckGo Enables AI Voice Chat without Saving Voice Data

DuckDuckGo has integrated AI-powered voice chat into its Duck.ai assistant, allowing users to converse with the model using spoken input. The company emphasizes that audio streams are processed in real time and are not stored after the session, with encryption...

By Help Net Security
How AI Is Reshaping Attack Path Analysis
NewsFeb 10, 2026

How AI Is Reshaping Attack Path Analysis

Cybersecurity teams are drowning in disparate findings, while adversaries leverage AI to craft rapid attack chains. By integrating AI with the MITRE ATT&CK framework, organizations can generate dynamic heat maps that surface coverage gaps and model realistic attack paths. Platforms...

By Help Net Security
What Happens when Cybersecurity Knowledge Walks Out the Door
NewsFeb 10, 2026

What Happens when Cybersecurity Knowledge Walks Out the Door

Andrew Northern, Principal Security Researcher at Censys, argues that mentorship is vital for preserving institutional memory and judgment under pressure in cybersecurity teams. He warns that when senior defenders disengage, the tacit knowledge needed to protect legacy‑heavy environments evaporates quickly....

By Help Net Security
AI-Driven Scams Are Eroding Trust in Calls, Messages, and Meetings
NewsFeb 10, 2026

AI-Driven Scams Are Eroding Trust in Calls, Messages, and Meetings

AI agents are now automating the research and targeting phases of social engineering, turning weeks‑long preparations into minutes. This automation lowers both the skill threshold and cost for launching phishing and scam campaigns. Deepfake audio and video are being used...

By Help Net Security
Cybersecurity Jobs Available Right Now: February 10, 2026
NewsFeb 10, 2026

Cybersecurity Jobs Available Right Now: February 10, 2026

February 2026’s cybersecurity job roundup lists 26 open positions across 12 countries, ranging from cloud security engineers to senior threat‑intelligence analysts. The roles cover cloud, AI, OT, and zero‑trust specializations, with many offering hybrid or fully remote work. Employers span consulting...

By Help Net Security
BeyondTrust Fixes Easy-to-Exploit Pre-Auth RCE Vulnerability in Remote Access Tools (CVE-2026-1731)
NewsFeb 9, 2026

BeyondTrust Fixes Easy-to-Exploit Pre-Auth RCE Vulnerability in Remote Access Tools (CVE-2026-1731)

BeyondTrust has patched a critical pre‑authentication remote code execution flaw (CVE‑2026‑1731) affecting its Remote Support and Privileged Remote Access products. The vulnerability lets unauthenticated attackers run OS commands on vulnerable on‑premise deployments. SaaS customers received the fix on February 2 2026, while...

By Help Net Security
OpenAI Updates Europe Privacy Policy, Adding New Data Categories
NewsFeb 9, 2026

OpenAI Updates Europe Privacy Policy, Adding New Data Categories

OpenAI has refreshed its Europe‑facing privacy policy to align with the November 2024 EU revisions. The new document expands coverage to include files, images, audio, video, and contact data, while adding clearer sections on user controls such as opting out of...

By Help Net Security
United Airlines CISO on Building Resilience when Disruption Is Inevitable
NewsFeb 9, 2026

United Airlines CISO on Building Resilience when Disruption Is Inevitable

United Airlines’ chief information security officer, Deneen DeFiore, explained how the carrier modernizes cybersecurity without jeopardizing safety‑critical aircraft systems. The airline wraps legacy platforms with modern identity, segmentation and monitoring controls while adding compensating resilience measures. United treats cyber risk...

By Help Net Security
Allama: Open-Source AI Security Automation
NewsFeb 9, 2026

Allama: Open-Source AI Security Automation

Allama is an open‑source security automation platform that lets teams build visual workflows for threat detection and response. It ships with integrations for more than 80 security tools, from SIEMs to ticketing systems, and leverages AI‑powered agents that can enrich,...

By Help Net Security
AI Agents Behave Like Users, but Don’t Follow the Same Rules
NewsFeb 9, 2026

AI Agents Behave Like Users, but Don’t Follow the Same Rules

The Cloud Security Alliance report warns that autonomous AI agents are expanding faster than identity and access management (IAM) frameworks can keep up. Organizations still rely on static credentials such as API keys and shared accounts, while modern workload‑identity standards...

By Help Net Security
State-Backed Phishing Attacks Targeting Military Officials and Journalists on Signal
NewsFeb 6, 2026

State-Backed Phishing Attacks Targeting Military Officials and Journalists on Signal

German authorities have identified a likely state‑backed hacking group targeting senior political figures, military officials, diplomats, and investigative journalists via the Signal messaging app. The attackers use two phishing variants: impersonating Signal support to solicit security PINs or verification codes,...

By Help Net Security
MintMCP’s Governance Platform Helps Organizations Deploy, Monitor, and Secure AI Agents
NewsFeb 6, 2026

MintMCP’s Governance Platform Helps Organizations Deploy, Monitor, and Secure AI Agents

MintMCP introduced an enterprise governance platform that lets organizations deploy, monitor, and secure AI agents and MCP servers at scale. The solution offers one‑click MCP server provisioning, real‑time agent activity tracing, and configurable guardrails to block risky actions. It also...

By Help Net Security
February 2026 Patch Tuesday Forecast: Lots of OOB Love This Month
NewsFeb 6, 2026

February 2026 Patch Tuesday Forecast: Lots of OOB Love This Month

Microsoft’s February 2026 Patch Tuesday follows a heavy January with 92 Windows 11/Server 2025 and 79 Windows 10 vulnerabilities addressed. Three out‑of‑band (OOB) patches were released in January to fix remote‑desktop credential prompts, Outlook .pst cloud storage errors, and a zero‑day Office vulnerability...

By Help Net Security
Kasada Account Intelligence Combats Manual Fraud and Abuse
NewsFeb 6, 2026

Kasada Account Intelligence Combats Manual Fraud and Abuse

Kasada has launched Account Intelligence, a real‑time solution that detects manual, account‑level fraud and abuse before financial loss occurs. The product uses high‑fidelity device telemetry linked to account behavior, allowing early identification of credential abuse, promo fraud, and coordinated multi‑account...

By Help Net Security
Mobile Privacy Audits Are Getting Harder
NewsFeb 6, 2026

Mobile Privacy Audits Are Getting Harder

Mobile privacy audits face verification gaps as apps hide data flows behind permissions and encrypted traffic. The new mopri framework combines static analysis of APKs with dynamic, user‑driven execution to capture real‑world network activity on Android devices. It offers modular...

By Help Net Security
The Hidden Cost of Putting Off Security Decisions
NewsFeb 6, 2026

The Hidden Cost of Putting Off Security Decisions

Hanah Darley, Chief AI Officer at Geordie AI, warns that postponing security decisions creates a hidden "visibility debt" that compounds over time. Each quarter without adequate insight allows shadow IT, legacy systems, and unmanaged assets to proliferate, leading to larger...

By Help Net Security
Microsoft Launches LiteBox, a Security-Focused Open-Source Library OS
NewsFeb 5, 2026

Microsoft Launches LiteBox, a Security-Focused Open-Source Library OS

Microsoft unveiled LiteBox, an open‑source library operating system designed to act as a secure kernel layer for protecting guest kernels through hardware virtualization. Developed alongside the Linux Virtualization Based Security (LVBS) project, LiteBox runs security‑critical code in a hardened, isolated...

By Help Net Security
AiStrike Introduces AI-Powered MDR to Reduce Costs and Alert Fatigue
NewsFeb 5, 2026

AiStrike Introduces AI-Powered MDR to Reduce Costs and Alert Fatigue

AiStrike has launched AiStrike MDR, an AI‑powered managed detection and response service that replaces traditional human‑intensive SOCs with an AI‑led, expert‑guided model. The platform unifies threat intelligence, detection, investigation and response across cloud, endpoint and identity data, delivering automated triage...

By Help Net Security
Varonis Acquires AllTrue.ai to Enable Safe, Compliant AI at Scale
NewsFeb 5, 2026

Varonis Acquires AllTrue.ai to Enable Safe, Compliant AI at Scale

Varonis announced the acquisition of AllTrue.ai to embed AI‑specific visibility and enforcement into its data‑centric security platform. The combined solution gives enterprises real‑time insight into AI models, agents and shadow AI, while applying guardrails that enforce least‑privilege access and compliance....

By Help Net Security
Smart Glasses Are Back, Privacy Issues Included
NewsFeb 5, 2026

Smart Glasses Are Back, Privacy Issues Included

After the failure of Google Glass, smart glasses are re‑emerging, led by the Ray‑Ban Meta collaboration that blends fashion with AI‑enabled camera and microphone. Harvard students showed the device’s video can be fed into facial‑recognition systems to identify strangers, while...

By Help Net Security
Cybersecurity Planning Keeps Moving Toward Whole-of-Society Models
NewsFeb 5, 2026

Cybersecurity Planning Keeps Moving Toward Whole-of-Society Models

National governments are reshaping cybersecurity into whole‑of‑society frameworks that link risk management, workforce development, technology standards, and cross‑sector coordination. Centralized authorities act as hubs for incident response, intelligence sharing, and international cooperation, while private operators remain pivotal for critical infrastructure...

By Help Net Security
Measuring AI Use Becomes a Business Requirement
NewsFeb 5, 2026

Measuring AI Use Becomes a Business Requirement

A Larridin survey reveals a 16‑point visibility gap between executives and directors on AI usage, highlighting pervasive shadow AI and fragmented governance. Large enterprises run an average of 23 AI tools, yet only 38 percent maintain a comprehensive inventory, leaving many...

By Help Net Security
ConnectSecure Introduces Linux Patching Capability to Simplify Cross-Distro Updates
NewsFeb 4, 2026

ConnectSecure Introduces Linux Patching Capability to Simplify Cross-Distro Updates

ConnectSecure unveiled a cross‑platform Linux patching capability that consolidates updates for Red Hat, Ubuntu, Debian, and CentOS into a single console. The tool automates kernel and OS patch identification and deployment, cutting manual effort by up to 80 %. It also introduces...

By Help Net Security
SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR
NewsFeb 4, 2026

SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR

SECNAP Network Security launched CloudJacket MXDR, a managed extended detection and response platform that unifies SOC, SIEM, and NDR functions under a single pane of glass. Built on the patented CloudJacket foundation, the solution adds multi‑tenant capabilities, AI‑augmented analyst workflows,...

By Help Net Security
Avast Brings Deepfake Scam Detection to Windows PCs and Mobile Devices
NewsFeb 4, 2026

Avast Brings Deepfake Scam Detection to Windows PCs and Mobile Devices

Avast announced the global rollout of its Scam Guardian and Scam Guardian Pro apps for Android and iOS, and introduced Deepfake Guard for Windows PCs. The new AI‑driven feature scans video audio in real time to detect malicious deepfake content, supporting...

By Help Net Security
Detectify Internal Scanning Finds and Fixes Vulnerabilities Behind the Firewall
NewsFeb 4, 2026

Detectify Internal Scanning Finds and Fixes Vulnerabilities Behind the Firewall

Detectify introduced Internal Scanning, a tool that extends its external‑facing crawling and fuzzing engine into private networks, enabling security teams to locate and fix vulnerabilities behind the firewall with the same speed as external tests. The solution deploys via a...

By Help Net Security
Global Threat Map: Open-Source Real-Time Situational Awareness Platform
NewsFeb 4, 2026

Global Threat Map: Open-Source Real-Time Situational Awareness Platform

Global Threat Map is an open‑source platform that aggregates multiple public threat‑intelligence feeds into a live, animated world map showing malware, phishing, botnet and other malicious activity. The project publishes its data‑collection code on GitHub, offering full transparency of sources...

By Help Net Security
How Secure by Design Helps Developers Build Secure Software
NewsFeb 4, 2026

How Secure by Design Helps Developers Build Secure Software

The Center for Internet Security and SAFECode have published "Secure by Design: A Guide to Assessing Software Security Practices," a risk‑based manual that integrates security into every stage of the software development lifecycle. The guide aligns the NIST Secure Software...

By Help Net Security
Why Incident Response Breaks Down when It Matters Most
NewsFeb 4, 2026

Why Incident Response Breaks Down when It Matters Most

In a Help Net Security video, Jon David, Managing Director at NR Labs, explains why incident response often collapses during active breaches. He highlights that hesitation, poor escalation, and weak communication let attackers outpace defenders. The discussion emphasizes that trust,...

By Help Net Security
Auto Finance Fraud Is Costing Dealers up to $20,000 per Incident
NewsFeb 4, 2026

Auto Finance Fraud Is Costing Dealers up to $20,000 per Incident

Auto dealers are facing a growing fraud problem that can cost up to $20,000 per incident, according to Experian research. The most common schemes involve income and employment misrepresentation, followed closely by synthetic and third‑party identity fraud. Fraud often surfaces...

By Help Net Security
Download: Tines Voice of Security 2026 Report
NewsFeb 3, 2026

Download: Tines Voice of Security 2026 Report

Tines has released its Voice of Security 2026 report, based on a survey of more than 1,800 security leaders and practitioners worldwide. The study reveals that while AI adoption is accelerating across security teams, manual work, rising workloads and burnout remain...

By Help Net Security
Sandisk Brings SPRandom to Open Source for Large SSD Testing
NewsFeb 3, 2026

Sandisk Brings SPRandom to Open Source for Large SSD Testing

SanDisk unveiled SPRandom, an open‑source preconditioning utility for large‑capacity enterprise SSDs. The tool, contributed to the fio benchmark suite, can shrink the time required to bring a 128 TB drive to steady state from over 144 hours to roughly six hours—a reduction...

By Help Net Security
Malwarebytes in ChatGPT Delivers AI-Powered Protection Against Scams
NewsFeb 2, 2026

Malwarebytes in ChatGPT Delivers AI-Powered Protection Against Scams

Malwarebytes has launched Malwarebytes in ChatGPT, embedding its threat‑intelligence engine into OpenAI’s chatbot to let users instantly assess scams, phishing links, and suspicious domains. The service draws on a continuously updated database that protects millions of devices, offering point‑by‑point analysis...

By Help Net Security
Span Cyber Security Arena 2026: Only 10 Days Left to Secure Early Bird Tickets
NewsFeb 2, 2026

Span Cyber Security Arena 2026: Only 10 Days Left to Secure Early Bird Tickets

Span Cyber Security Arena 2026 will be held May 20‑22 in Poreč, Croatia, at the five‑star Pical Resort. The event features three days of conference sessions plus two pre‑conference masterclasses on May 18‑19 for engineers, architects, and consultants. Keynote speakers include...

By Help Net Security
Open-Source AI Pentesting Tools Are Getting Uncomfortably Good
NewsFeb 2, 2026

Open-Source AI Pentesting Tools Are Getting Uncomfortably Good

Open‑source AI pentesting tools are reaching production‑grade performance, with BugTrace‑AI, Shannon, and the Cybersecurity AI Framework (CAI) each demonstrating distinct strengths in a lab test. BugTrace‑AI acts as a low‑noise reconnaissance assistant, flagging likely flaws without launching exploits. Shannon takes...

By Help Net Security
Where NSA Zero Trust Guidance Aligns with Enterprise Reality
NewsFeb 2, 2026

Where NSA Zero Trust Guidance Aligns with Enterprise Reality

The NSA released Phase One and Phase Two of its Zero Trust Implementation Guidelines, outlining 36 and 41 activities respectively to achieve 30 and 34 distinct capabilities. The guidance builds on earlier Primer and Discovery Phase documents and aligns with...

By Help Net Security
Pompelmi: Open-Source Secure File Upload Scanning for Node.js
NewsFeb 2, 2026

Pompelmi: Open-Source Secure File Upload Scanning for Node.js

Pompelmi is an open‑source toolkit that adds inline malware scanning to Node.js file‑upload handlers. It inspects files in memory, applying configurable policies on extensions, size, MIME types, and archive contents before any data reaches storage. The library offers pluggable scanning...

By Help Net Security
What Boards Need to Hear About Cyber Risk, and What They Don’t
NewsFeb 2, 2026

What Boards Need to Hear About Cyber Risk, and What They Don’t

Entrust CIO Rishi Kaushal explains how security leaders should brief corporate boards on cyber risk, linking cryptography, certificates, and authentication to tangible business outcomes such as revenue loss, outages, fraud, and regulatory exposure. He demystifies the digital‑trust layer, arguing that...

By Help Net Security
AI Is Flooding IAM Systems with New Identities
NewsFeb 2, 2026

AI Is Flooding IAM Systems with New Identities

The Cloud Security Alliance reports that AI‑generated identities are being treated like traditional non‑human accounts, exposing them to the same IAM weaknesses such as credential sprawl and unclear ownership. AI systems create and retire identities at unprecedented speed, overwhelming legacy...

By Help Net Security
Microsoft Sets New Timeline for Sentinel Transition to Defender Portal
NewsJan 30, 2026

Microsoft Sets New Timeline for Sentinel Transition to Defender Portal

Microsoft has postponed the migration of Microsoft Sentinel from the Azure portal to the Microsoft Defender portal, setting a new sunset date of March 31 2027—about nine months later than originally planned. The shift responds to extensive customer and partner feedback requesting...

By Help Net Security
Arkose Titan Aims to Make Bot, Scraping, and AI Fraud Economically Unviable
NewsJan 30, 2026

Arkose Titan Aims to Make Bot, Scraping, and AI Fraud Economically Unviable

Arkose Labs unveiled Arkose Titan, a unified platform that defends against both human‑driven and AI‑powered fraud, scraping, and bot attacks. The solution consolidates bot detection, device and email intelligence, API security, behavioral biometrics, and phishing protection into a single API...

By Help Net Security
EFF Calls Out Major Tech Companies on Encryption Promises
NewsJan 30, 2026

EFF Calls Out Major Tech Companies on Encryption Promises

The Electronic Frontier Foundation (EFF) has launched the "Encrypt It Already" campaign, urging major tech firms to fulfill announced end‑to‑end encryption promises, enable encryption by default, and broaden encrypted storage. The initiative groups demands into three categories—Keep your promises, Defaults...

By Help Net Security
Apple’s New Privacy Feature Limits How Precisely Carriers Track Your Location
NewsJan 30, 2026

Apple’s New Privacy Feature Limits How Precisely Carriers Track Your Location

Apple introduced a new privacy setting called Limit Precise Location in iOS 26.3, which reduces the granularity of location data shared with cellular networks. When enabled, carriers can only determine a user’s approximate neighborhood rather than the exact address, while app‑level...

By Help Net Security
Wearable Tech Adoption Continues as Privacy Worries Grow
NewsJan 30, 2026

Wearable Tech Adoption Continues as Privacy Worries Grow

Over one billion people now wear fitness trackers that continuously collect health metrics, creating a massive stream of sensitive personal data. A recent Clutch survey shows 74% of users are worried about how this data is handled, while only 58%...

By Help Net Security
Virtue AI AgentSuite Enables Enterprises to Test and Secure AI Agents
NewsJan 29, 2026

Virtue AI AgentSuite Enables Enterprises to Test and Secure AI Agents

Virtue AI has launched AgentSuite, a multi‑layer security and compliance platform designed for enterprise AI agents. The solution lets organizations test agents, enforce real‑time guardrails, and control tool access while providing full audit trails. IBM research shows 79% of enterprises...

By Help Net Security