Posts

Russian hackers go after high-value targets through Signal

Russian intelligence-linked hackers are targeting commercial messaging platforms...

Zluri addresses expanding identity attack surface acros...

Enterprise identity is undergoing a fundamental shift. Employees are no longer t...

Proofpoint unifies email, data, and AI security to redu...

Proofpoint has unveiled innovations across its Collaboration Security and Data S...

The SEC just gave crypto its clearest win in years, but...

The crypto industry finally got the clear lines it spent years demanding from Wa...

Trivy Hack Spreads Infostealer via Docker, Triggers Wor...

Cybersecurity researchers have uncovered malicious artifacts distributed via Doc...

US Government Returning $470,735 to Crypto Scam Victims...

The U.S. Department of Justice (DOJ) will return approximately $470,735 to two v...

The Bay Area’s animal welfare movement wants to recruit AI

In early February, animal welfare advocates and AI researchers gathered in stock...

Booz Allen’s Vellox brings AI vs. AI defense to protect...

Booz Allen Hamilton’s new Vellox suite showcases how AI-native cyber defense can...

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Un...

Threat actors are suspected to be exploiting a maximum-severity security flaw im...

US Sanctions North Korean Criminal Network for Allegedl...

The U.S. Department of the Treasury is sanctioning a North Korean criminal organ...

NIST updates its DNS security guidance for the first ti...

DNS infrastructure underpins nearly every network connection an organization mak...

Plumber: Open-source scanner of GitLab CI/CD pipelines ...

GitLab CI/CD pipelines often accumulate configuration decisions that drift from ...

Your AI agents are moving sensitive data. Do you know w...

In this Help Net Security interview, Gidi Cohen, CEO at Bonfy.AI, addresses what...

Why Bitcoin was made for the stagflation economic condi...

One economic word could well define 2026: stagflation. It is an ugly word that d...

Do you want to build a robot snowman?

On the latest episode of the Equity podcast, we recapped CEO Jensen Huang’s GTC ...

Why crypto hacks don’t end and continue even when the m...

A crypto hack never ends when the wallet is drained. The theft lands first, fast...