Box Shield Pro monitors AI workflows and sensitive data

Box announced Box Shield Pro, a new suite of security capabilities powered by AI, that builds on the company’s flagship content protection solution, Box Shield. With Box Shield Pro,... Read more »

F5 moves to secure generative AI with CalypsoAI acquisition

F5 announced its intent to acquire CalypsoAI, whose platform brings real-time threat defense, red teaming at scale, and data security to enterprises racing to deploy generative and agentic AI.... Read more »

N-able’s Cat-MIP standardizes terminology for AI automation

N-able has introduced Cat-MIP, a solution designed to standardize and document terminology for AI automation and MCP Server behaviors across MSP and IT ecosystems. This breakthrough enables IT service... Read more »

Default Cursor setting can be exploited to run malicious code on developers’ machines

An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code on users’ computers, researchers have warned. An exploitable vulnerability... Read more »

Cynomi simplifies vendor risk management

Cynomi has launched its Third-Party Risk Management (TPRM) module. Delivered as an add-on to the Cynomi vCISO Platform, the new capability integrates vendor risk management into existing service providers’... Read more »

Hush Security emerges from stealth to replace legacy vaults with secretless access

Hush Security has raised $11 million in seed funding led by Battery Ventures and YL Ventures. As agentic AI expands, Hush replaces legacy vaults and secrets across the enterprise... Read more »

When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is... Read more »

How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on... Read more »

AI is everywhere, but scaling it is another story

AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point... Read more »

The state of DMARC adoption: What 10M domains reveal

In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains... Read more »
Subscribe to our Newsletter