Legit Security delivers automated security reviews for AppSec and development teams

Legit Security announced enhanced capabilities for significant code change and workflow orchestration within its platform. These capabilities provide insight into changes in code, configuration, or infrastructure that can impact... Read more »

Akeyless SecretlessAI protects machine-to-machine communication

Akeyless has launched Akeyless SecretlessAI, a solution purpose-built to secure AI agents and Model Context Protocol (MCP) servers. As enterprises accelerate AI adoption, these autonomous systems are increasingly entrusted... Read more »

What a mature OT security program looks like in practice

In this Help Net Security interview, Cindy Segond von Banchet CC, Cybersecurity Lead at Yokogawa Europe, shares her insights on what defines a sustainable OT security program. She outlines... Read more »

Machine unlearning gets a practical privacy upgrade

Machine learning models are everywhere now, from chatbots to credit scoring tools, and they carry traces of the data they were trained on. When someone asks to have their... Read more »

Why silent authentication is the smarter way to secure BYOD

In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution to the security and productivity challenges of BYOD. He... Read more »

What Fortune 100s are getting wrong about cybersecurity hiring

Many companies say they can’t find enough cybersecurity professionals. But a new report suggests the real problem isn’t a lack of talent, but how those jobs are structured and... Read more »

Tired of gaps in your security? These open-source tools can help

When it comes to spotting threats, security teams need tools that can pull data from all over and make it easier to analyze. In this article, we’ll take a... Read more »

Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)

International law enforcement operation disrupted the activities of the pro-Russia hacking group NoName057(16). European and U.S. authorities disrupted the activities of the pro-Russian hacktivist group NoName057(16) in Operation Eastwood.... Read more »

SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit

Unknown intruders are targeting fully patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances and deploying a novel, persistent backdoor / rootkit, analysts with Google’s Threat Intelligence Group... Read more »

Co-op chief ‘incredibly sorry’ for theft of 6.5m members’ data

Co-op chief executive Shirine Khoury-Haq has revealed that all the personal data of all 6.5 million of its members was compromised in the April 2025 cyber attack on its... Read more »
Subscribe to our Newsletter