Help Net Security

Help Net Security Daily information security news with a focus on enterprise security.

  • Google unveils new AI and cloud security capabilities at Security Summit
    by Sinisa Markovic on August 19, 2025 at 4:00 pm

    Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations centers, enhancements in cloud security, and extended safeguards for enterprise browsing. New dashboards in Google Security Operations showcasing the native integration of SOAR data AI security takes the spotlight AI security took center stage with the debut of new … More → The post Google unveils new AI and cloud security capabilities at Security Summit appeared first on Help Net Security.

  • Webinar: Why AI and SaaS are now the same attack surface
    by Help Net Security on August 19, 2025 at 2:54 pm

    The lines between SaaS and AI are vanishing. AI agents are now first-class citizens in your SaaS universe: accessing sensitive data, triggering workflows, and introducing new risks that legacy SaaS security posture management tools (SSPM) miss. Security teams are discovering that managing SaaS in isolation from AI is a recipe for dangerous blind spots. What you’ll learn in this webinar: How SaaS and AI have converged into a single, dynamic attack surface Key findings from … More → The post Webinar: Why AI and SaaS are now the same attack surface appeared first on Help Net Security.

  • Cofense Vision 3.0 identifies user engagement with phishing emails
    by Industry News on August 19, 2025 at 2:08 pm

    Cofense launched Vision 3.0, the latest advancement to its Phishing Threat Detection and Response (PDR) platform. Vision 3.0 delivers faster, smarter incident response by giving security teams visibility into exactly how users interacted with phishing emails that slipped past perimeter defenses. Building on the popular “Who Opened” feature, the latest “Who Clicked” update allows analysts to see whether a user opened a malicious message, clicked a link, downloaded a file, or connected to a suspicious … More → The post Cofense Vision 3.0 identifies user engagement with phishing emails appeared first on Help Net Security.

  • Android VPN apps used by millions are covertly connected AND insecure
    by Zeljka Zorz on August 19, 2025 at 2:06 pm

    Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Finding the secret links Virtual private networks (VPNs) are widely marketed as tools for enhancing privacy, securing internet traffic, and shielding users from surveillance. Unfortunately, the consumer VPN ecosystem is decidedly opaque, making it difficult (and sometime impossible) for users to make an evidence-based decision … More → The post Android VPN apps used by millions are covertly connected AND insecure appeared first on Help Net Security.

  • Git 2.51: Preparing for the future with SHA-256
    by Anamarija Pogorelec on August 19, 2025 at 6:36 am

    Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes several technical changes, but one of the most important areas of work is Git’s move toward stronger cryptographic security through SHA-256 support. Git has relied on SHA-1 since its creation in 2005. SHA-1 has been showing its age for years, with researchers demonstrating collision attacks that make it unsuitable for long-term use. The community has … More → The post Git 2.51: Preparing for the future with SHA-256 appeared first on Help Net Security.

  • What happens when penetration testing goes virtual and gets an AI coach
    by Mirko Zorz on August 19, 2025 at 6:00 am

    Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the University of Bari Aldo Moro propose using Cyber Digital Twins (CDTs) and generative AI to create realistic, interactive environments for cybersecurity education. Their framework simulates IT, OT, and IoT systems in a controlled virtual space and layers AI-driven feedback on top. The goal is to improve penetration testing skills … More → The post What happens when penetration testing goes virtual and gets an AI coach appeared first on Help Net Security.

  • As AI grows smarter, your identity security must too
    by Help Net Security on August 19, 2025 at 5:30 am

    AI is no longer on the horizon, it’s already transforming how organizations operate. In just a few years, we’ve gone from isolated pilots to enterprise-wide adoption. According to a recent SailPoint survey, 82% of companies are running AI agents today, often across multiple business functions. These agents aren’t just passive tools; they’re autonomous systems that act, decide, and adapt at remarkable speed and scale. These systems now handle responsibilities once reserved for skilled human oversight, … More → The post As AI grows smarter, your identity security must too appeared first on Help Net Security.

  • The cybersecurity myths companies can’t seem to shake
    by Sinisa Markovic on August 19, 2025 at 5:00 am

    Cybersecurity myths are like digital weeds: pull one out, and another quickly sprouts in its place. You’ve probably heard them before: Macs don’t get viruses, we’re too small to be a target, or changing passwords often keeps us safer. Experts have been busting these myths for years, yet they still stick around and shape bad strategies while giving people a false sense of security. Myth 1: AI can replace your security team No matter how … More → The post The cybersecurity myths companies can’t seem to shake appeared first on Help Net Security.

  • What makes airport and airline systems so vulnerable to attack?
    by Help Net Security on August 19, 2025 at 4:30 am

    In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex aviation ecosystem, from legacy systems and third-party vendors to the challenges of testing in safety-critical environments. Ozdag emphasizes the importance of packet-level monitoring, real-time validation, and a zero-trust mindset, urging aviation leaders to treat cybersecurity as a core element of safety, not just compliance. The post What makes airport and airline systems so vulnerable to attack? appeared first on Help Net Security.

  • Cybersecurity jobs available right now: August 19, 2025
    by Sinisa Markovic on August 19, 2025 at 4:00 am

    Senior Cybersecurity Analyst DOT Security | USA | On-site – View job details As a Senior Cybersecurity Analyst, you will lead the investigation of real-time alerts from SIEM platforms and other security tools, ensuring timely identification of potential threats. You will also perform in-depth forensic analysis of firewall logs, IDS/IPS alerts, and packet captures to validate or dismiss security events Principal Security Engineer Punt | Canada | On-site – View job details As a Principal … More → The post Cybersecurity jobs available right now: August 19, 2025 appeared first on Help Net Security.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.