Help Net Security - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
Help Net Security

Help Net Security

Publication
0 followers

Established cybersecurity portal providing daily news and expert security advisories.

Recent Posts

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities
Deals•Feb 5, 2026

Varonis Acquires AllTrue.ai to Boost AI Security Capabilities

Varonis announced the acquisition of AI security startup AllTrue.ai, adding real‑time visibility and enforcement for AI systems to its data security platform. The deal expands Varonis’ capabilities in AI‑TRiSM, helping organizations monitor and control AI models, agents, and data access. Financial terms were not disclosed.

Help Net Security
Claroty Secures $150M Series F Funding Led by Golub Growth
Deals•Jan 22, 2026

Claroty Secures $150M Series F Funding Led by Golub Growth

Claroty announced a $150 million Series F round led by Golub Growth, an affiliate of Golub Capital, with existing investors contributing up to $50 million. The capital will fund global expansion and further development of its cyber‑physical systems protection platform.

Help Net Security
British Army to Spend £279 Million on Permanent Cyber Regiment Base
News•Jan 19, 2026

British Army to Spend £279 Million on Permanent Cyber Regiment Base

The British Army will invest £279 million to build a permanent base for its 13 Signal Regiment at Duke of Gloucester Barracks in Gloucestershire. The new facility will house cyber training, operations, and the Army’s Cyber, Information and Security Operations Centre, enhancing...

By Help Net Security
SEON Identity Verification Combines KYC Checks with Real-Time Fraud Intelligence
News•Jan 19, 2026

SEON Identity Verification Combines KYC Checks with Real-Time Fraud Intelligence

SEON introduced an AI‑powered Identity Verification solution that combines document validation, biometric liveness detection, proof‑of‑address checks, and optional government database queries within its unified risk platform. The service draws on more than 900 real‑time fraud signals to evaluate both the...

By Help Net Security
Global Tensions Are Pushing Cyber Activity Toward Dangerous Territory
News•Jan 19, 2026

Global Tensions Are Pushing Cyber Activity Toward Dangerous Territory

Geopolitical rivalries are increasingly manifesting as cyber operations that target critical infrastructure, disinformation networks, and supply‑chain dependencies. Recent incidents—from the Ukrainian power‑grid outage to a Norwegian dam breach—illustrate how state actors can weaponize digital tools against civilian services. AI‑generated disinformation...

By Help Net Security
Rubrik Introduces Security Cloud Sovereign for Data Sovereignty and Regulatory Compliance
News•Jan 19, 2026

Rubrik Introduces Security Cloud Sovereign for Data Sovereignty and Regulatory Compliance

Rubrik unveiled Security Cloud Sovereign, a data‑protection platform that keeps all data, metadata, and control planes inside a customer‑chosen jurisdiction. The solution offers immutable safeguards that prevent encryption, deletion, or alteration even if attackers gain elevated access. Integrated threat‑detection analytics...

By Help Net Security
Review: AI Strategy and Security
News•Jan 19, 2026

Review: AI Strategy and Security

AI Strategy and Security, authored by Dr. Donnie W. Wendt, is a practical guide for technology leaders and security professionals designing enterprise AI programs. The book maps AI adoption to business objectives, outlines readiness assessments, and defines a comprehensive team...

By Help Net Security
Bytebase: Open-Source Database DevOps Tool
News•Jan 19, 2026

Bytebase: Open-Source Database DevOps Tool

Bytebase is an open‑source DevOps platform that streamlines database schema and data changes through a structured change‑request workflow. It lets teams submit SQL changes, run automated reviews, and track executions across development, staging, and production environments. The tool includes built‑in...

By Help Net Security
New Intelligence Is Moving Faster than Enterprise Controls
News•Jan 16, 2026

New Intelligence Is Moving Faster than Enterprise Controls

A new NTT global study finds AI integration outpaces enterprise security and governance. Companies expand AI deployments but many lack infrastructure readiness, data integrity controls, and mature governance. Only a small share can support AI at scale; performance drives design,...

By Help Net Security
Who’s on the Other End? Rented Accounts Are Stress-Testing Trust in Gig Platforms
News•Jan 16, 2026

Who’s on the Other End? Rented Accounts Are Stress-Testing Trust in Gig Platforms

A TransUnion study of U.S. gig workers reveals that 34% have been defrauded by customers, while nearly half admit to renting or selling their accounts. Victims demand stronger identity checks, yet confidence in existing safety tools remains low. The research...

By Help Net Security
Bitwarden Advances Passkeys and Credential Risk Controls
News•Jan 15, 2026

Bitwarden Advances Passkeys and Credential Risk Controls

Bitwarden unveiled Access Intelligence, delivering application‑level visibility into weak, reused or exposed credentials and guiding remediation, cutting average resolution time from nine days. The company also expanded passkey support, adding native Windows 11 integration, cross‑platform portability via the FIDO Credential Exchange...

By Help Net Security
F5 Targets AI Runtime Risk with New Guardrails and Adversarial Testing Tools
News•Jan 15, 2026

F5 Targets AI Runtime Risk with New Guardrails and Adversarial Testing Tools

F5 announced the general availability of two AI‑runtime security products—F5 AI Guardrails and F5 AI Red Team. The Guardrails solution provides model‑agnostic, real‑time protection for AI agents, while the Red Team offers automated adversarial testing using a continuously updated threat...

By Help Net Security
Asimily Extends Cisco ISE Integration to Turn Device Risk Into Segmentation Policy
News•Jan 15, 2026

Asimily Extends Cisco ISE Integration to Turn Device Risk Into Segmentation Policy

Asimily announced new microsegmentation capabilities that add Security Group Access Control List (SGACL) support to Cisco Identity Services Engine (ISE). The integration lets organizations automatically translate device classification, behavior analysis, and risk scores into enforceable segmentation policies. By extending its...

By Help Net Security
Microsoft Shuts Down RedVDS Cybercrime Subscription Service Tied to Millions in Fraud Losses
News•Jan 15, 2026

Microsoft Shuts Down RedVDS Cybercrime Subscription Service Tied to Millions in Fraud Losses

Microsoft announced a coordinated legal operation in the United States and United Kingdom, backed by Europol and German authorities, to dismantle RedVDS, a subscription‑based cybercrime platform. Since March 2025, RedVDS has enabled fraudsters to rent disposable virtual machines for $24...

By Help Net Security
LinkedIn Wants to Make Verification a Portable Trust Signal
News•Jan 15, 2026

LinkedIn Wants to Make Verification a Portable Trust Signal

LinkedIn is launching a self‑serve API that lets its Verified on LinkedIn badge be displayed on third‑party platforms, turning the verification badge into a portable trust signal. The company reports that 75 members verify each minute, now exceeding 100 million verified...

By Help Net Security
QR Codes Are Getting Colorful, Fancy, and Dangerous
News•Jan 15, 2026

QR Codes Are Getting Colorful, Fancy, and Dangerous

QR codes have evolved from plain black‑and‑white squares to colorful, logo‑embedded designs, making them a popular yet risky communication channel. Researchers at Deakin University identified a surge in "quishing" attacks that exploit these stylized codes to bypass traditional URL‑based security...

By Help Net Security
Cybersecurity Spending Keeps Rising, so Why Is Business Impact Still Hard to Explain?
News•Jan 15, 2026

Cybersecurity Spending Keeps Rising, so Why Is Business Impact Still Hard to Explain?

Cybersecurity budgets are set to increase again, yet security leaders still struggle to demonstrate clear business value. Finance executives express uneven trust in security teams’ ability to translate risk mitigation into financial outcomes, creating friction in budget approvals. Divergent definitions...

By Help Net Security
The NSA Lays Out the First Steps for Zero Trust Adoption
News•Jan 15, 2026

The NSA Lays Out the First Steps for Zero Trust Adoption

The National Security Agency has published the first two documents in its Zero Trust Implementation Guidelines series—a Primer and a Discovery Phase guide. The Primer explains the structure and principles of the series, while the Discovery Phase directs organizations to...

By Help Net Security
Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
News•Jan 14, 2026

Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026

Former Gartner analyst Ravisha Chugh and Abnormal’s Director of Product Marketing Lane Billings will host a webinar on January 20 2026, revealing how email‑security vendors will be evaluated in 2026. The session outlines Gartner’s evaluation criteria, essential vendor questions, red‑flags, and a proven shortlisting...

By Help Net Security
Airia Adds AI Governance for Compliance, Accountability, and Control
News•Jan 14, 2026

Airia Adds AI Governance for Compliance, Accountability, and Control

Airia has launched an AI Governance product, completing its three‑pillar enterprise AI management ecosystem alongside AI Security and Agent Orchestration. The new suite offers a governance dashboard, model and agent registries, compliance automation, and risk assessment tools to provide end‑to‑end...

By Help Net Security
One Identity Manager 10.0 Introduces Risk-Based Governance and ITDR Capabilities
News•Jan 14, 2026

One Identity Manager 10.0 Introduces Risk-Based Governance and ITDR Capabilities

One Identity launched Manager 10.0, adding risk‑based governance, identity threat detection and response (ITDR) playbooks, and AI‑assisted natural‑language reporting. The upgrade integrates third‑party UEBA risk scores, automates remediation actions, and introduces a browser‑based admin console. Enhanced Syslog CEF formatting improves SIEM...

By Help Net Security
Scamnetic Delivers Fraud Protection Across All Payment Types
News•Jan 14, 2026

Scamnetic Delivers Fraud Protection Across All Payment Types

Scamnetic launched its patent‑pending IDeveryone Payment Protection solution, extending identity‑proofing to every payment channel—from push and digital payments to cryptocurrency, checks, wire transfers and ACH. The offering adds real‑time recipient verification and optional insurance, aiming to curb the $442 billion global...

By Help Net Security
CISO Assistant: Open-Source Cybersecurity Management and GRC
News•Jan 14, 2026

CISO Assistant: Open-Source Cybersecurity Management and GRC

CISO Assistant’s community edition is an open‑source governance, risk, and compliance (GRC) platform that lets security teams document assets, risks, controls, and framework alignment in a single, self‑hosted system. The tool ships with built‑in mappings to ISO 27001, NIST CSF, and...

By Help Net Security
Firmware Scanning Time, Cost, and Where Teams Run EMBA
News•Jan 14, 2026

Firmware Scanning Time, Cost, and Where Teams Run EMBA

A new research paper compares the EMBA firmware analysis tool on a local workstation and an Azure virtual machine, measuring execution time, repeatability, and cost. Identical configurations and a common firmware set were used, revealing that scan duration depends more...

By Help Net Security
How AI Image Tools Can Be Tricked Into Making Political Propaganda
News•Jan 14, 2026

How AI Image Tools Can Be Tricked Into Making Political Propaganda

A new study shows that commercial text‑to‑image models can be coaxed into generating political propaganda by replacing explicit names with descriptive profiles and fragmenting prompts across multiple low‑risk languages. Researchers tested GPT‑4o, GPT‑5 and GPT‑5.1, achieving bypass rates up to...

By Help Net Security
F5 NGINXaaS for Google Cloud Protects Cloud-Native Applications
News•Jan 13, 2026

F5 NGINXaaS for Google Cloud Protects Cloud-Native Applications

F5 has introduced F5 NGINXaaS for Google Cloud, a managed, cloud‑native application delivery‑as‑a‑service that unifies load balancing, security and observability. Developed with Google Cloud, the service is available through the Marketplace and targets containerized, AI‑enabled workloads. It offers programmable traffic...

By Help Net Security
Concentric AI Releases Private Scan Manager for AWS GovCloud (US)
News•Jan 13, 2026

Concentric AI Releases Private Scan Manager for AWS GovCloud (US)

Concentric AI has added Private Scan Manager support for AWS GovCloud (US), allowing federal agencies, contractors, and partners to run its Semantic Intelligence platform within isolated, U.S.-only cloud regions. The extension follows earlier 2025 announcements of private‑cloud scanning for Azure...

By Help Net Security
Noction Adds Automatic Anomaly Detection to IRP v4.3 for Faster DDoS Mitigation
News•Jan 13, 2026

Noction Adds Automatic Anomaly Detection to IRP v4.3 for Faster DDoS Mitigation

Noction launched Intelligent Routing Platform (IRP) v4.3, adding Automatic Anomaly Detection (AAD) that spots abnormal traffic and triggers edge‑level DDoS mitigation. The system can automatically apply BGP FlowSpec filters or blackhole traffic, with optional operator review. IRP v4.3 also upgrades Commit Control...

By Help Net Security
Minimal Ubuntu Pro Expands Canonical’s Cloud Security Offerings
News•Jan 13, 2026

Minimal Ubuntu Pro Expands Canonical’s Cloud Security Offerings

Canonical has launched Minimal Ubuntu Pro images for public cloud platforms, delivering a leaner base OS with only essential components. The images retain Ubuntu Pro’s extended security maintenance, covering core packages and critical cloud functionality. They are now available through...

By Help Net Security
AI EdgeLabs Launches Compliance Center and Linux Audit for NIS2 and CRA Readiness
News•Jan 13, 2026

AI EdgeLabs Launches Compliance Center and Linux Audit for NIS2 and CRA Readiness

AI EdgeLabs unveiled its Compliance Center and Linux Audit suite, targeting organizations bound by the EU NIS2 directive and the Cyber Resilience Act. The platform replaces manual reporting with continuous, AI‑driven visibility, delivering a unified risk score and real‑time posture...

By Help Net Security
Parrot OS Shares Its 2026 Plans for Security Tools and Platform Support
News•Jan 13, 2026

Parrot OS Shares Its 2026 Plans for Security Tools and Platform Support

Parrot OS, the Debian‑based cybersecurity distribution, released version 7.0 in late 2025 and outlined its 2026 roadmap. The plan adds new security and AI‑focused tools, enhances lightweight, container and cloud deployment support, and expands documentation for repeatable labs. Development will...

By Help Net Security
Rakuten Viber CISO/CTO on Balancing Encryption, Abuse Prevention, and Platform Resilience
News•Jan 13, 2026

Rakuten Viber CISO/CTO on Balancing Encryption, Abuse Prevention, and Platform Resilience

Rakuten Viber’s CISO/CTO Liad Shnell says the messenger is now critical infrastructure, so security priorities extend beyond confidentiality to availability, integrity and abuse resilience. The platform ships end‑to‑end encryption by default and relies on AI‑driven analysis of metadata, behavioral signals...

By Help Net Security
Turning Cyber Metrics Into Decisions Leaders Can Act On
News•Jan 13, 2026

Turning Cyber Metrics Into Decisions Leaders Can Act On

In a Help Net Security video, Myriad360 Field CISO Bryan Sacks argues that cybersecurity metrics should inform executive decisions rather than serve merely as reporting tools. He emphasizes aligning security initiatives with business priorities set by CEOs and boards, using...

By Help Net Security
Teaching Cybersecurity by Letting Students Break Things
News•Jan 13, 2026

Teaching Cybersecurity by Letting Students Break Things

Airbus Cybersecurity and Dauphine University found that embedding structured hacking, social engineering, and capture‑the‑flag exercises into curricula dramatically increases student engagement and confidence. The study tracked participants as they assumed attacker, analyst, and insider roles, culminating in a mixed‑reality CTF...

By Help Net Security
Cybersecurity Jobs Available Right Now: January 13, 2026
News•Jan 13, 2026

Cybersecurity Jobs Available Right Now: January 13, 2026

The January 2026 cybersecurity job roundup lists more than 30 senior‑level openings across continents, from CISO roles at Australia’s CSIRO to GenAI security specialists in Israel. Positions span core disciplines such as threat hunting, vulnerability management, IAM governance, and OT network...

By Help Net Security
Booz Allen Hamilton and Andreessen Horowitz Accelerate Commercial Tech for Government
News•Jan 12, 2026

Booz Allen Hamilton and Andreessen Horowitz Accelerate Commercial Tech for Government

Booz Allen Hamilton announced a partnership with Andreessen Horowitz, designating Booz Allen as the a16z Technology Acceleration Partner for Governments. The alliance will connect a16z’s portfolio startups with Booz Allen’s deep mission expertise, secure‑network capabilities, and engineering talent to fast‑track...

By Help Net Security
Debian 13.3 Is Now Available with Targeted Corrections, Updates
News•Jan 12, 2026

Debian 13.3 Is Now Available with Targeted Corrections, Updates

Debian 13.3, the third point release for the stable “trixie” branch, is now available. It bundles over one hundred package adjustments and multiple security patches, covering core services such as Apache HTTP Server, GNOME components, and container tools. Existing Debian...

By Help Net Security
Rethinking OT Security for Project Heavy Shipyards
News•Jan 12, 2026

Rethinking OT Security for Project Heavy Shipyards

Hans Quivooij, CISO of Damen Shipyards, explains how the project‑driven, contractor‑heavy nature of modern shipyards expands the OT threat surface and renders traditional perimeter security ineffective. He advocates passive network monitoring and strict segmentation to gain visibility into legacy PLCs...

By Help Net Security
PfSense: Open-Source Firewall and Routing Platform
News•Jan 12, 2026

PfSense: Open-Source Firewall and Routing Platform

pfSense Community Edition (CE) is a free, open‑source firewall and routing platform that runs on standard x86 hardware, virtual machines, and select embedded devices. It offers stateful firewalling, IPv4/IPv6 support, VLAN tagging, and multi‑WAN capabilities through an intuitive web interface....

By Help Net Security
What Security Teams Can Learn From Torrent Metadata
News•Jan 12, 2026

What Security Teams Can Learn From Torrent Metadata

A new research paper demonstrates how open‑source intelligence can turn public torrent metadata into actionable threat intelligence. By harvesting file descriptors, tracker‑provided peer lists and enriching over 60,000 IP addresses with geolocation, ISP and VPN indicators, the authors built network...

By Help Net Security
EU’s Chat Control Could Put Government Monitoring Inside Robots
News•Jan 12, 2026

EU’s Chat Control Could Put Government Monitoring Inside Robots

EU’s proposed Chat Control regulation, originally targeting online child sexual abuse, now extends to robots that facilitate interpersonal communication. By defining any interactive service as a communication service, the law obliges robot providers to conduct risk assessments and potentially embed...

By Help Net Security
Week in Review: PoC for Trend Micro Apex Central RCE Released, Patch Tuesday Forecast
News•Jan 11, 2026

Week in Review: PoC for Trend Micro Apex Central RCE Released, Patch Tuesday Forecast

The week’s security roundup highlighted a critical proof‑of‑concept for an unauthenticated remote‑code execution flaw in Trend Micro Apex Central (CVE‑2025‑69258) and a newly disclosed exploit of HPE OneView (CVE‑2025‑37164). The UK government unveiled a £210 million Cyber Action Plan to harden public‑service...

By Help Net Security
European Commission Opens Consultation on EU Digital Ecosystems
News•Jan 9, 2026

European Commission Opens Consultation on EU Digital Ecosystems

The European Commission has launched a public consultation on open digital ecosystems, running from 6 January to 3 February 2026, to gather evidence for a forthcoming Communication due in Q1 2026. The call highlights that 70‑90 % of software code in EU digital systems relies...

By Help Net Security
January 2026 Patch Tuesday Forecast: And so It Continues
News•Jan 9, 2026

January 2026 Patch Tuesday Forecast: And so It Continues

The latest Patch Tuesday briefing highlights Microsoft’s December 2025 update problems, including MSMQ failures and a RemoteApp issue on Windows 11 Azure Virtual Desktop that can be mitigated with a registry key or KIR rollback. Apple released December security patches addressing...

By Help Net Security
How AI Agents Are Turning Security Inside-Out
News•Jan 9, 2026

How AI Agents Are Turning Security Inside-Out

AppSec teams now face a new threat from internally built no‑code AI agents that operate across enterprise systems. These agents execute business logic, call APIs, and move data in real time, behaving like always‑on applications with high privileges. Because they...

By Help Net Security
Security Teams Are Paying More Attention to the Energy Cost of Detection
News•Jan 9, 2026

Security Teams Are Paying More Attention to the Energy Cost of Detection

Security teams are increasingly scrutinizing the energy footprint of detection models as cloud costs and sustainability pressures rise. A recent study measured common anomaly detection algorithms for both traditional performance metrics and their power consumption, introducing an Eco Efficiency Index...

By Help Net Security
Wi-Fi Evolution Tightens Focus on Access Control
News•Jan 9, 2026

Wi-Fi Evolution Tightens Focus on Access Control

The Wireless Broadband Alliance reports rapid enterprise adoption of Wi‑Fi 7, driven by higher throughput, lower latency, and the newly available 6 GHz spectrum. Mixed‑generation device environments are forcing operators to rethink policy, telemetry, and access control across all radios. Security concerns...

By Help Net Security
Upwind Choppy AI Simplifies Cloud Security Exploration and Investigation
News•Jan 8, 2026

Upwind Choppy AI Simplifies Cloud Security Exploration and Investigation

Upwind has launched Choppy AI, an add‑on that embeds generative‑AI capabilities throughout its Cloud‑Native Application Protection Platform (CNAPP). The tool converts natural‑language commands into visible, editable queries and security rules, letting teams investigate inventories, policies, and vulnerabilities without opaque black‑box...

By Help Net Security
Cyera Raises $400M in Series F Round, Valuation Hits $9B
Deals•Jan 8, 2026

Cyera Raises $400M in Series F Round, Valuation Hits $9B

Cyera announced a $400 million Series F funding round, bringing total funding to over $1.7 billion and valuing the company at $9 billion. The round was led by Blackstone funds and included participation from existing investors such as Accel, Coatue, Sequoia Capital...

Help Net Security

Page 5 of 6

← Prev1…3456Next →