CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

Google addressed four vulnerabilities affecting its Chrome web browser, including one that has been exploited in the wild. Google released security updates to address four vulnerabilities in the Chrome... Read more »

Gurucul’s AI-IRM accelerates insider risk detection

Gurucul released its AI Insider Risk Management (AI-IRM) product, which extends autonomous triage, bias-free risk scoring, context-rich investigation, and human-AI collaboration to automate response workflows directly within insider risk... Read more »

QuProtect R3 provides encryption visibility across systems

QuSecure launched QuProtect R3, an integrated, production-ready PQC platform designed to simplify encryption modernization for everyone. With the platform’s Reconnaissance innovation, a complimentary module for qualified companies, QuProtect R3... Read more »

Jaguar Land Rover will extend its production halt into a third week following a cyberattack

Jaguar Land Rover will keep vehicle production halted until at least September 24 following a cyberattack that hit the company earlier this month. Jaguar Land Rover will extend its... Read more »

DruAI Agents and MetaGraph deliver real-time data intelligence

Druva released Dru MetaGraph, a secure, tenant-specific, graph-powered foundation for real-time data intelligence, and two new DruAI Agents: Insights Agent and Lifecycle Agent. Together, these innovations can help customers... Read more »

Catchpoint improves monitoring posture with AI capabilities

Catchpoint released two AI-powered capabilities designed to simplify digital resilience for critical applications: Catchpoint Root Cause Analysis (RCA) and Catchpoint Advisor, which improve monitoring posture and bring immediate insights... Read more »

Absolute Security Rehydrate restores compromised endpoints

Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational downtime. Enterprises with business operations that have been stopped... Read more »

Ping Identity debuts AI framework to keep humans in control

Ping Identity announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This... Read more »

Behind the scenes of cURL with its founder: Releases, updates, and security

In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure across billions of devices, from cloud services to IoT.... Read more »

Product showcase: Exaforce – The full lifecycle AI SOC platform

Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm analysts, manual investigations eat... Read more »
Subscribe to our Newsletter