ENISA advisory examines package manager security risks

Developers install external libraries with a single command, and that step can introduce more code than expected into a project environment. Dependency resolution inside package managers extends software supply... Read more »

WhatsApp is giving parents peace of mind over their kids’ privacy

WhatsApp has introduced parent-managed accounts designed for pre-teens, giving parents and guardians new controls over contacts, group participation, and how the app is used. These accounts are limited to... Read more »

Socure Launch enables startups to deploy identity verification and fraud controls

Socure has announced Socure Launch, providing every organization with immediate access to industry tested, pre-built identity and fraud solutions. This marks a new era for Socure, providing startups an... Read more »

Zscaler enhances data sovereignty controls with regional processing and logging

Zscaler has expanded its data sovereignty capabilities globally, powered by the Zscaler Zero Trust Exchange cloud security platform. For global enterprises, the conflict between protecting data and enabling cross-border... Read more »

SOC Prime’s DetectFlow Enterprise moves threat detection to the data ingestion layer

SOC Prime has announced the release of DetectFlow Enterprise, a solution that brings real-time threat detection to the ingestion layer, turning data pipelines into detection pipelines. Running tens of... Read more »

Binary Defense’s NightBeacon brings AI-driven analysis to SOCs

Binary Defense has announced the launch of NightBeacon, an AI-powered security operations platform built directly into the company’s security operations center (SOC). NightBeacon serves as the intelligence infrastructure behind... Read more »

War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in... Read more »

Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans

Codoxo has announced the launch of Deepfake Detection, an AI-driven fraud detection tool now being deployed by health plans across the U.S. The solution helps identify AI-generated or manipulated... Read more »

Stop fixing OT security with IT thinking

In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices... Read more »

Agentic attack chains advance as infostealers flood criminal markets

Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums,... Read more »
Subscribe to our Newsletter