New Black Kite module delivers product-level insight into software supply chain vulnerabilities

Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform... Read more »

watchTowr Active Defense delivers automated protection from exposure to defense

watchTowr announced major capability enhancements, including the launch of Active Defense, a new capability that closes the gap between discovery and protection. Active Defense delivers automated, intelligence-driven protection the... Read more »

Polish Police arrest 3 Ukrainians for possessing advanced hacking tools

Poland arrested three Ukrainian nationals accused of using hacking devices to target IT systems and obtain sensitive defense-related data. Polish police arrested three Ukrainian nationals for allegedly trying to... Read more »

Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery

A human rights lawyer from Pakistan’s Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first time a civil society member in the country... Read more »

Are we mistaking regulation for resilience?

We have a growing number of cyber compliance regulations, yet our country’s cyber resilience remains fragile. What is going wrong? Read more »

AI-driven threats are heading straight for the factory floor

In this Help Net Security interview, Natalia Oropeza, Chief Cybersecurity Officer at Siemens, discusses how industrial organizations are adapting to a shift in cyber risk driven by AI. She... Read more »

Why bug bounty schemes have not led to secure software

Computer Weekly speaks to Katie Moussouris, security entrepreneur and bug bounty pioneer, about the life of security researchers, bug bounties and the artificial intelligence revolution Read more »

AI agents break rules in unexpected ways

AI agents are starting to take on tasks that used to be handled by people. These systems plan steps, call tools, and carry out actions without a person approving... Read more »

New image signature can survive cropping, stop deepfakes from hijacking trust

Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines... Read more »

The simple shift that turns threat intel from noise into real insight

In this Help Net Security video, Alankrit Chona, CTO at Simbian, explains how security teams can put threat intelligence to work in a way that supports detection, response, and... Read more »
Subscribe to our Newsletter