From cleaners to creepers: The risk of mobile privilege escalation

In this Help Net Security video, Nico Chiaraviglio, Chief Scientist at Zimperium, explores how Android apps can be abused to escalate privileges, giving attackers access to sensitive data and... Read more »

Employees are using AI where they know they shouldn’t

Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according to GoTo. In fact, 62% believe AI has been... Read more »

Researchers unearth keyloggers on Outlook login pages

Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of government organizations and companies around the world, and have injected the organizations’ Outlook on the Web (OWA) login page... Read more »

Aravo Evaluate Engine manages and optimizes third-party risks

Aravo announced new innovations that add significant enhancements to its Evaluate Engine, enabling customers to extend the scale, scope, and range of their third-party risk scoring to meet their... Read more »

Free AI coding security rules now available on GitHub

Developers are turning to AI coding assistants to save time and speed up their work. But these tools can also introduce security risks if they suggest flawed or unsafe... Read more »

Sumsub Device Intelligence offers protection against identity threats

Sumsub is expanding its Fraud Prevention solution with advanced Device Intelligence, enhanced by the Fingerprint platform. Designed to identify threats before they escalate, Device Intelligence offers real-time insights with accuracy... Read more »

BigID Vendor AI Assessment reduces third-party AI risk

BigID launched Vendor AI Assessment, a solution designed to help organizations identify, evaluate, and manage the risks introduced by third-party AI usage. As vendors race to embed GenAI, large... Read more »

Hackers love events. Why aren’t more CISOs paying attention?

When CISOs think about risk, they usually think about cloud platforms, laptops, and data centers. But live events like conferences, trade shows, product launches, and shareholder meetings bring a... Read more »

Before scaling GenAI, map your LLM usage and risk zones

In this Help Net Security interview, Paolo del Mundo, Director of Application and Cloud Security at The Motley Fool, discusses how organizations can scale their AI usage by implementing... Read more »

CURBy: A quantum random number generator you can verify

NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called the Colorado University Randomness Beacon (CURBy), the system offers... Read more »
Subscribe to our Newsletter