Review: Digital Forensics, Investigation, and Response, 5th Edition

Digital Forensics, Investigation, and Response, 5th Edition presents a structured survey of the digital forensics discipline. The book spans foundational principles, platform specific analysis, specialized branches, and incident response... Read more »

AI-driven DAST reduces manual setup and surfaces exploitable vulnerabilities

In this Help Net Security interview, Joni Klippert, CEO at StackHawk, discusses what defines DAST coverage in 2026 and why scan completion does not equal security. She explains how... Read more »

Hottest cybersecurity open-source tools of the month: February 2026

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Pompelmi: Open-source secure file upload scanning for Node.js Software teams building... Read more »

Threat actor leveraged Cisco SD-WAN zero-day since 2023 (CVE-2026-20127)

A “highly sophisticated” cyber threat actor has been exploiting a zero-day authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN Controller (formerly vSmart), Cisco has announced today. The vulnerability was... Read more »

Fake Zoom meeting leads to silent install of surveillance software

Malwarebytes researchers have uncovered a fake (but convincing) Zoom meeting page that downloads surveillance software on Windows computers and tricks users into running it. According to Microsoft MVP Steven... Read more »

Netskope NewEdge AI Fast Path reduces latency for enterprise AI workloads

Netskope has announced NewEdge AI Fast Path, a set of capabilities designed to optimize network paths to critical AI destinations, including applications hosted in public, private, or neo-cloud environments.... Read more »

SentinelOne addresses identity risk across endpoints, browsers, and AI workflows

SentinelOne has unveiled its Singularity Identity portfolio designed to secure the growing population of non-human identities, including AI agents, service accounts, APIs, and workloads. Identity attacks have long been... Read more »

Veza expands platform with AI Access Agents for enterprise identity governance

Veza expanded its platform with Veza Access Agents, a set of purpose-built AI agents designed to automate complex identity and access governance tasks for enterprises. Veza also announced advancements... Read more »

CloudCasa expands Red Hat OpenShift data protection across edge and hybrid cloud

CloudCasa has announced enhancements to its backup and recovery platform designed to support Red Hat OpenShift environments across core, edge, and hybrid cloud deployments. The latest CloudCasa updates introduce... Read more »

Anthropic brings Claude Code to mobile devices

Anthropic has introduced a new Claude Code feature called Remote Control, allowing developers to continue a local coding session from a phone, tablet, or any web browser. The feature... Read more »
Subscribe to our Newsletter