Please turn on your JavaScript for this page to function normally.
Help Net Security
Upwind Choppy AI simplifies cloud security exploration and investigation

Upwind announced Choppy AI, embedding new AI-powered capabilities across the company’s CNAPP platform. Choppy AI introduces natural-language–driven experiences that make cloud …

HPE OneView
Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)

An unauthenticated remote code execution vulnerability (CVE-2025-37164) affecting certain versions of HPE OneView is being leveraged by attackers, CISA confirmed by adding the …

Help Net Security
Vannadium’s Leap combines on-chain performance and data integrity for explainable AI

Vannadium has launched Leap, a platform that combines blockchain-level data integrity with real-time, on-chain performance. As AI is adopted in sectors like healthcare, …

Help Net Security
Cyera secures $400 million to scale AI-native data security platform and enterprise adoption

Cyera announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just over six months after the previous round and …

Trend Micro
PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)

Trend Micro has released a critical patch fixing several remotely exploitable vulnerabilities in Apex Central (on-premise), including a flaw (CVE-2025-69258) that may allow …

IPFire
IPFire update brings new network and security features to firewall deployments

Security and operations teams often work with firewall platforms that require frequent tuning or upgrades to meet evolving network demands. IPFire has released its 2.29 Core …

phishing
Cybercriminals are scaling phishing attacks with ready-made kits

Phishing-as-a-Service (PhaaS) kits lower the barrier to entry, enabling less-skilled attackers to run large-scale, targeted phishing campaigns that impersonate legitimate …

StackRox
StackRox: Open-source Kubernetes security platform

Security teams spend a lot of time stitching together checks across container images, running workloads, and deployment pipelines. The work often happens under time pressure, …

AI agent
What happens to insider risk when AI becomes a coworker

In this Help Net Security video, Ashley Rose, CEO at Living Security, discusses how AI is changing insider risk. AI is now built into daily work across departments, which …

PCI DSS
Passwords are where PCI DSS compliance often breaks down

Most PCI DSS failures do not start with malware or a targeted attack. They start with everyday behavior. Reused passwords. Credentials stored in spreadsheets. Shared logins …

voice deepfakes
Voice cloning defenses are easier to undo than expected

Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found that widely used voice protection methods can be …

UK
UK announces grand plan to secure online public services

The UK has announced a new Government Cyber Action Plan aimed at making online public services more secure and resilient, and has allocated £210 million (approximately $283 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools