Stop fixing OT security with IT thinking

In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices... Read more »

Agentic attack chains advance as infostealers flood criminal markets

Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums,... Read more »

Does Anthropic deserve the trust of the cybersecurity community?

The cybersecurity industry runs on trust. The belief that when a vendor says they will behave a certain way, they will, that critical CVEs are in fact critical, or... Read more »

Wireless vulnerabilities are doubling every few years

Wireless vulnerabilities are being disclosed at a rate that has no precedent in the fifteen-year history of systematic tracking. In 2025, researchers published 937 new wireless-related CVEs, an average... Read more »

ShinyHunters claims new campaign targeting Salesforce Experience Cloud sites

Salesforce customers have, once again, been targeted by the ShinyHunters group – or, at least, it’s what the group claims. Attackers modified and abused benign tool On Saturday, Saleforce... Read more »

Researchers uncover AI-powered vishing platform

A vishing-as-a-service platform that helps scammers carry out so-called “press 1” scams is misusing text-to-speech (TTS) capabilities provided by AI voice technology company ElevenLabs, Mirage Security researchers claim. How... Read more »

Fortanix helps enterprises build resilience with multi-sourced quantum entropy

Fortanix announced a new multi-sourced quantum entropy capability within Fortanix Data Security Manager (DSM), enabling enterprises to diversify encryption key generation at the origin of trust. Through partnerships with... Read more »

Network Map 2.0 provides live network mapping and faster risk containment

Zero Networks has announced Network Map 2.0, an advancement in real-time network mapping designed to help large enterprises eliminate decision paralysis, reduce blast radius and turn visibility into immediate,... Read more »

Vicarius vIntelligence brings continuous risk validation and AI-driven security automation

Vicarius has announced the launch of vIntelligence, a new product that introduces agentic intelligence and continuous validation to the company’s security portfolio. With this release, Vicarius becomes a two-product... Read more »

Meta turns to AI to sniff out scams on Facebook, Messenger and WhatsApp

Meta’s new tools on Facebook, Messenger, and WhatsApp protect users from scams. They use advanced AI systems to analyze text, images, and surrounding context and identify sophisticated scam patterns.... Read more »
Subscribe to our Newsletter