Cybercriminals have built a business on YouTube’s blind spots

The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a space where entertainment,... Read more »

Uncovering the risks of unmanaged identities

Every organization manages thousands of identities, from admins and developers to service accounts and AI agents. But many of these identities operate in the shadows, untracked and unprotected. These... Read more »

Deepfakes, fraud, and the fight for trust online

In this Help Net Security video, Michael Engle, Chief Strategy Officer at 1Kosmos, explains how deepfakes are changing online identity verification. He describes how fake IDs and synthetic identities... Read more »

Financial services can’t shake security debt

In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones linger longer, creating a kind of software “interest” that... Read more »

Cybersecurity jobs available right now: November 4, 2025

Cybersecurity Architect Alstom | France | On-site – View job details As a Cybersecurity Architect, you will analyze solutions, identify associated risks, and propose security architecture models by involving... Read more »

Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI

The volume of threat intelligence data has grown exponentially, but the ability to interpret and act on it has not. Every day brings new CVE disclosures, exploit releases, and... Read more »

Zenity delivers runtime protection for OpenAI’s AgentKit

Zenity announced runtime protection for OpenAI’s AgentKit, providing enterprise-grade enforcement that detects and blocks data leakage, secret exposure and unsafe agent behavior in real time. This launch follows Zenity... Read more »

Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military

A spear-phishing campaign aimed to compromise Russian and Belarusian military personnel by using military-themed documents as a lure has been flagged by Cyble and Seqrite security researchers. The goal... Read more »

A new way to think about zero trust for workloads

Static credentials have been a weak point in cloud security for years. A new paper by researchers from SentinelOne takes direct aim at that issue with a practical model... Read more »

Heisenberg: Open-source software supply chain health check tool

Heisenberg is an open-source tool that checks the health of a software supply chain. It analyzes dependencies using data from deps.dev, Software Bills of Materials (SBOMs), and external advisories... Read more »
Subscribe to our Newsletter