RGS IC Cloud Support enables Kubernetes management in restricted cloud environments

Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments. IC... Read more »

Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots

Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow data. This new capability addresses critical challenges facing security... Read more »

U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam

The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal... Read more »

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks

Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams to detect, triage, and take down brand and executive... Read more »

New Jscrambler AI Assistant accelerates PCI DSS compliance decisions

Jscrambler announced the AI Assistant for PCI DSS script authorization workflows, which delivers context-rich insights and expert recommendations to enable prompt and confident script authorization decisions and justifications. PCI... Read more »

A safer way to break industrial systems (on purpose)

Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a way to make that easier.... Read more »

Maltrail: Open-source malicious traffic detection system

Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists, as well as static lists... Read more »

Building trust in AI-powered security operations

In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability... Read more »

The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components.... Read more »

The power grid is getting old, and so is the cybersecurity protecting it

Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy,... Read more »
Subscribe to our Newsletter