Cyber Security

With AI’s help, North Korean hackers stumbled into a ne...

For many years, state-sponsored hacking was defined by human expertise in findin...

Where AI in CI/CD is working for engineering teams

Developers have folded AI into daily coding work. Still, the same tools remain l...

IT spending to hit $6.31 trillion record, thanks to AI

Global spending on IT is expected to reach $6.31 trillion in 2026, according to ...

A study of 1,000 Android apps finds a privacy policy lo...

Android developers write log statements for the same reasons they always have: d...

AI is speeding up nation-state cyber programs

In this Help Net Security interview, Kaja Ciglic, Senior Director, Cybersecurity...

OpenAI’s GPT-5.5 is out with expanded cybersecurity saf...

Competition to release stronger AI models is accelerating, and just weeks after ...

Ubuntu 26.04 LTS delivers memory-safe system tools and ...

Linux distributions have spent the past few years absorbing GPU vendor toolchain...

Meta is overhauling how you sign in, manage settings, a...

Meta Account gives users of Meta apps and devices a simpler way to access and ma...

New Cisco firewall malware can only be killed by pullin...

Suspected state-sponsored attackers are using a custom backdoor to persistently ...

Compromised everyday devices power Chinese cyber espion...

China-linked threat actors have shifted from individually procured infrastructur...

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to...

Chinese-speaking individuals are the target of a new campaign that uses a trojan...

UNC6692 Impersonates IT Help Desk via Microsoft Teams t...

A previously undocumented threat activity cluster known as UNC6692 has been obse...

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours ...

A high-severity security flaw in LMDeploy, an open-source toolkit for compressin...

Tropic Trooper APT Takes Aim at Home Routers, Japanese ...

The Chinese state-sponsored cyber threat is known for moving fast and trying odd...

China-Backed Hackers Are Industrializing Botnets

China's state-backed groups are now using covert networks of compromised devices...

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to...

A previously undocumented threat activity cluster known as UNC6692 has been obse...