Please turn on your JavaScript for this page to function normally.
security operations
Cutting the cost of SIEM rule conversion

You inherit two thousand detection rules from an acquisition. They are written for a platform your company does not use. Your senior detection engineer estimates six months to …

AWS Rex
AWS open sources Trusted Remote Execution to control what AI agents touch

Production scripts that read a log file generally hold the same permissions as scripts that delete one. The execution context decides what gets touched, and that gap widens …

smartphone
Phishing can masquerade as emergency alerts for disasters, researchers warn

Emergency alerts for disasters like earthquakes and tsunamis are messages we hope we never see, and we trust them when they arrive. Researchers have shown that this trust can …

identity
Meta’s AI will scan height and bone structure to detect under-13 users

Meta is deploying AI that scans photos and videos for physical cues to assess whether a user is under 13 on Instagram and Facebook. Teen Account on Instagram (Source: Meta) …

Help Net Security
Tanium Atlas aims to accelerate threat response in the AI era

Tanium announced Tanium Atlas, an autonomous operating system (OS) that gives a single IT or security operator the data, guidance and reach to accomplish what once required an …

Ollama
Unpatched flaws turn Ollama’s auto-updater into a persistent RCE vector, researchers say

Researchers at Striga have disclosed two vulnerabilities (CVE-2026-42248, CVE-2026-42249) in Ollama’s Windows auto-updater that, when chained together, may allow an …

Help Net Security
LastPass Mobile Smart Scanner improves password security

LastPass has launched Mobile Smart Scanner, a solution that converts photographs of typed or handwritten credentials into structured, ready-to-use password entries that can be …

software bug
Google to pay up to $1.5 million for zero-click Pixel Titan M exploits

Google has revised its Android and Chrome Vulnerability Reward Programs (VRPs), which pay security researchers to report vulnerabilities in Android, Google hardware, and the …

CIS AWS AI workloads
Download: Secure Foundations for AI Workloads on AWS

Center for Internet Security helps organizations deploy AI and high-performance compute environments from a trusted, hardened operating system baseline. CIS Hardened Images …

sentence
Conti ransomware gang member sentenced to 102 months in prison

A Latvian national who was part of a major Russian ransomware organization that stole from and extorted more than 54 companies has been sentenced to 102 months in prison. …

Help Net Security
VIAVI CyberFlood CF1000 pushes 400G validation for multi-terabit AI data centers

VIAVI Solutions has announced the launch of its next-generation CyberFlood CF1000 Appliance, a native 400G security and application performance test platform for the …

Oracle
Oracle rolls out monthly security patch updates

Oracle is changing how its security fixes are delivered: starting in May 2026, there will be a monthly Critical Security Patch Update. “Each [monthly] CSPU is smaller …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools