Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data... Read more »

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to store and index network traffic in standard PCAP format,... Read more »

What could a secure 6G network look like?

The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be... Read more »

Why neglected assets are the hidden threat attackers love to find

In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated... Read more »

Static feeds leave intelligence teams reacting to irrelevant or late data

Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need... Read more »

Week in review: Salesloft Drift breach investigation results, malicious GitHub Desktop installers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Salesloft Drift data breach: Investigation reveals how attackers got in The attack that resulted... Read more »

HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot

ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware, augmented with the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass... Read more »

CISA looks to partners to shore up the future of the CVE Program

The US Cybersecurity and Infrastructure Security Agency (CISA) has affirmed its continuing support for the Common Vulnerabilities and Exposures (CVE) program. “If we want to outpace and outmaneuver our... Read more »

HCL AppScan 360º 2.0 protects software supply chains

HCLSoftware launched HCL AppScan 360º version 2.0, a next-generation application security platform designed to help organizations regain control over their software supply chains. As open-source adoption accelerates and global... Read more »

Sublime Security enhances threat protection with AI agent

Sublime Security released the Autonomous Detection Engineer (ADÉ), an end-to-end AI agent that turns attack telemetry into transparent and auditable protection that security teams can trust. Email attacks are... Read more »
Subscribe to our Newsletter