Cyber Security

Binary Defense’s NightBeacon brings AI-driven analysis ...

Binary Defense has announced the launch of NightBeacon, an AI-powered security o...

SOC Prime’s DetectFlow Enterprise moves threat detectio...

SOC Prime has announced the release of DetectFlow Enterprise, a solution that br...

Zscaler enhances data sovereignty controls with regiona...

Zscaler has expanded its data sovereignty capabilities globally, powered by the ...

Attackers Don't Just Send Phishing Emails. They Weaponi...

The most dangerous phishing campaigns aren’t just designed to fool employees. Ma...

Apple Issues Security Updates for Older iOS Devices Tar...

Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macO...

War spreads into cyberspace after Iran-linked hackers h...

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S...

Six Android Malware Families Target Pix Payments, Banki...

Cybersecurity researchers have discovered half-a-dozen new Android malware famil...

Codoxo’s Deepfake Detection identifies AI-generated med...

Codoxo has announced the launch of Deepfake Detection, an AI-driven fraud detect...

Wireless vulnerabilities are doubling every few years

Wireless vulnerabilities are being disclosed at a rate that has no precedent in ...

Does Anthropic deserve the trust of the cybersecurity c...

The cybersecurity industry runs on trust. The belief that when a vendor says the...

Agentic attack chains advance as infostealers flood cri...

Cybercriminals spent much of 2025 automating their operations, shifting from one...

Stop fixing OT security with IT thinking

In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, di...

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Ins...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday ad...

INC Ransomware Group Holds Healthcare Hostage in Oceania

Government agencies, emergency clinics, and others in Australia, New Zealand, an...

Xygeni GitHub Action Compromised Via Tag Poison

Attackers operated an active C2 implant for up to a week and compromised AppSec ...

Researchers uncover AI-powered vishing platform

A vishing-as-a-service platform that helps scammers carry out so-called “press 1...