Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google
Google unveils new AI and cloud security capabilities at Security Summit

Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements …

Help Net Security
Druva introduces multiple agents to automate critical tasks

Druva announced a major expansion to DruAI, the company’s suite of AI capabilities for customers. This expansion marks Druva’s next step in agentic data security, …

Vorlon webinar
Webinar: Why AI and SaaS are now the same attack surface

The lines between SaaS and AI are vanishing. AI agents are now first-class citizens in your SaaS universe: accessing sensitive data, triggering workflows, and introducing new …

Help Net Security
Cofense Vision 3.0 identifies user engagement with phishing emails

Cofense launched Vision 3.0, the latest advancement to its Phishing Threat Detection and Response (PDR) platform. Vision 3.0 delivers faster, smarter incident response by …

VPN
Android VPN apps used by millions are covertly connected AND insecure

Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State …

Git 2.51
Git 2.51: Preparing for the future with SHA-256

Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes several technical changes, but one of the most …

digital twin
What happens when penetration testing goes virtual and gets an AI coach

Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the …

identity, face, code, privacy, person
As AI grows smarter, your identity security must too

AI is no longer on the horizon, it’s already transforming how organizations operate. In just a few years, we’ve gone from isolated pilots to enterprise-wide adoption. …

cybersecurity myths
The cybersecurity myths companies can’t seem to shake

Cybersecurity myths are like digital weeds: pull one out, and another quickly sprouts in its place. You’ve probably heard them before: Macs don’t get viruses, we’re too small …

airplane
What makes airport and airline systems so vulnerable to attack?

In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex …

cybersecurity jobs
Cybersecurity jobs available right now: August 19, 2025

Senior Cybersecurity Analyst DOT Security | USA | On-site – No longer accepting applications As a Senior Cybersecurity Analyst, you will lead the investigation of …

people
New NIST guide explains how to detect morphed images

Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools