October 2025
IRISSCON 2025 to address the human impact on cybersecurity
Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject in depth at IRISSCON 2025, …
Sublime Security secures $150 million to accelerate AI-driven, automated email protection
Sublime Security has raised $150 million in Series C funding led by Georgian to accelerate its agentic AI capabilities and bring new levels of proactive, automated defense to …
New Corero SmartWall ONE capability blocks encrypted DDoS threats without latency
Corero Network Security announced a new SmartWall ONE capability that stops encrypted application-layer attacks in real time without added latency or infrastructure. The …
Mastercard unveils Threat Intelligence to fight cyber-enabled payment fraud
Mastercard announced Mastercard Threat Intelligence, a threat intelligence offering applied to payments at scale. The solution combines Mastercard’s fraud insights and global …
Incode Agentic Identity links AI agents to verified humans
Incode Technologies has launched Agentic Identity, a solution that enables enterprises to verify, authorize, and continuously monitor autonomous AI agents that they interact …
AI Service Assist expands TeamDynamix ITSM platform with integrated intelligence
TeamDynamix introduced AI Service Assist, an extension of its core IT Service Management (ITSM) platform that leverages AI agents with native integration and automation for …
Elastic Streams uses agentic AI to simplify log parsing and accelerate issue resolution for SREstic
Elastic announced Streams, an agentic AI-powered solution that rethinks how teams work with logs to enable much faster incident investigation and resolution. Streams uses AI …
FS launches PicOS AI Switch System to power large-scale AI and HPC workloads
FS has released its PicOS AI Switch System, a comprehensive networking solution engineered to support large-scale AI training, inference, and HPC workloads. By integrating …
Managing legacy medical devices that can no longer be patched
In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in …
Chain of security weaknesses found in smart air compressor model
Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience …
Review: The Wireless Cookbook
The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who …
How to stop third-party risk from becoming your biggest headache
In this Help Net Security video, Robert Kraczek, Global IAM Strategist at One Identity, takes a deep dive into the growing problem of third-party cyber exposure and what it …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month