War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in... Read more »

Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans

Codoxo has announced the launch of Deepfake Detection, an AI-driven fraud detection tool now being deployed by health plans across the U.S. The solution helps identify AI-generated or manipulated... Read more »

Stop fixing OT security with IT thinking

In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices... Read more »

Agentic attack chains advance as infostealers flood criminal markets

Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums,... Read more »

Does Anthropic deserve the trust of the cybersecurity community?

The cybersecurity industry runs on trust. The belief that when a vendor says they will behave a certain way, they will, that critical CVEs are in fact critical, or... Read more »

Wireless vulnerabilities are doubling every few years

Wireless vulnerabilities are being disclosed at a rate that has no precedent in the fifteen-year history of systematic tracking. In 2025, researchers published 937 new wireless-related CVEs, an average... Read more »

ShinyHunters claims new campaign targeting Salesforce Experience Cloud sites

Salesforce customers have, once again, been targeted by the ShinyHunters group – or, at least, it’s what the group claims. Attackers modified and abused benign tool On Saturday, Saleforce... Read more »

Researchers uncover AI-powered vishing platform

A vishing-as-a-service platform that helps scammers carry out so-called “press 1” scams is misusing text-to-speech (TTS) capabilities provided by AI voice technology company ElevenLabs, Mirage Security researchers claim. How... Read more »

Fortanix helps enterprises build resilience with multi-sourced quantum entropy

Fortanix announced a new multi-sourced quantum entropy capability within Fortanix Data Security Manager (DSM), enabling enterprises to diversify encryption key generation at the origin of trust. Through partnerships with... Read more »

Network Map 2.0 provides live network mapping and faster risk containment

Zero Networks has announced Network Map 2.0, an advancement in real-time network mapping designed to help large enterprises eliminate decision paralysis, reduce blast radius and turn visibility into immediate,... Read more »
Subscribe to our Newsletter