Help Net Security Daily information security news with a focus on enterprise security.
- Scattered Lapsus$ Hunters seeks women for vishing attacksby Zeljka Zorz on February 26, 2026 at 12:53 pm
The Scattered Lapsus$ Hunters (SLH) hacking collective has launched a recruitment push aimed specifically at women, offering cash payments for participating in voice-phishing (vishing) attacks. A few days ago, threat intelligence firm Dataminr detected posts on a public Telegram channel advertising roles for female callers willing to conduct social-engineering phone operations. SLH’s recruitment ad (Source: Dataminr) The group is apparently offering between $500 and $1,000 per call, up front, and is supplying prepared scripts to … More → The post Scattered Lapsus$ Hunters seeks women for vishing attacks appeared first on Help Net Security.
- Samsung’s Galaxy S26 turns privacy into a visible and invisible featureby Sinisa Markovic on February 26, 2026 at 9:57 am
The Samsung Galaxy S26 series is out, offering plenty of security features that protect personal data while providing users with transparency and control over how their information is used. The feature that grabbed the spotlight is the built-in Privacy Display on the Galaxy S26 Ultra model, designed to help keep on-screen activity out of view in public places. Privacy Display “Privacy Display goes beyond anything previously available on mobile devices, with hardware and software working … More → The post Samsung’s Galaxy S26 turns privacy into a visible and invisible feature appeared first on Help Net Security.
- Anthropic acquires Vercept to expand the capabilities of AI computer useby Industry News on February 26, 2026 at 9:49 am
Anthropic has acquired Vercept to help push Claude’s computer use capabilities further. People are using Claude for increasingly complex work, including writing and running code across entire repositories, synthesizing research from dozens of sources, and managing workflows that span multiple tools and teams. Computer use enables Claude to do all of that inside live applications, the way a person at a keyboard would. That means Claude can take on multi-step tasks in live applications and … More → The post Anthropic acquires Vercept to expand the capabilities of AI computer use appeared first on Help Net Security.
- Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issueby Anamarija Pogorelec on February 26, 2026 at 8:32 am
Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and parsing accuracy at the center of daily operations. Wireshark version 4.6.4 addresses two vulnerabilities affecting protocol dissectors and resolves a plugin compatibility issue within the 4.6 release series. Dissector vulnerabilities resolved The update fixes a crash in the HTTP3 dissector and an infinite loop in the MEGACO dissector. Both flaws could interrupt analysis activity … More → The post Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issue appeared first on Help Net Security.
- Lightrun brings live runtime context to AI site reliability engineeringby Industry News on February 26, 2026 at 7:34 am
Lightrun has announced real-time AI SRE built on live, in-line runtime context. This enables AI agents and engineering teams to dynamically generate missing evidence without redeployments, prove root causes with live execution data (“ground truth”), and validate fixes directly in live environments. The mass adoption of AI agents and coding assistants has accelerated code generation, outpacing reliability. This has shifted developer time from writing code to verifying and fixing issues, and moved the development bottleneck … More → The post Lightrun brings live runtime context to AI site reliability engineering appeared first on Help Net Security.
- Intellicheck Desktop Application helps organizations combat identity theftby Industry News on February 26, 2026 at 7:30 am
Intellicheck announced the roll out of its enriched Desktop Application. The new Desktop Application allows any sized organization to immediately stop identity theft and fraud losses. Implementation is immediate. No system integration is needed. This comes at minimal cost. The technology solution works with the scanners most organizations already have in place. Intellicheck’s Desktop Application is designed for customers of all sizes. The application ensures a superior, frictionless and rapid customer authentication experience. Businesses can … More → The post Intellicheck Desktop Application helps organizations combat identity theft appeared first on Help Net Security.
- The $19.5 million insider risk problemby Mirko Zorz on February 26, 2026 at 7:00 am
Routine employee activity across corporate systems carries an average annual cost of $19.5 million per organization. That figure comes from the 2026 Cost of Insider Risks Global Report, conducted by the Ponemon Institute and based on data from 354 organizations that experienced one or more material insider related incidents over the past year. Negligent or mistaken insiders account for the largest share of financial impact. These incidents generate $10.3 million in annualized cost per organization, … More → The post The $19.5 million insider risk problem appeared first on Help Net Security.
- APCON IntellaStore IV analyzes network traffic characteristics for further processingby Industry News on February 26, 2026 at 6:37 am
Deploying the IntellaStore IV Network Security Appliance from APCON means easy installation, dedicated network packet capture, and a seamless workflow from traffic of interest to security and compliance tools. The release of APCON’s IntellaStore IV empowers network security engineers, business owners, office managers, and others to conveniently address network visibility (filtering, port tagging, etc.) as well as their vital security needs. With the APCON Intelligent Processor (AIp) running the server-side software, users are free to … More → The post APCON IntellaStore IV analyzes network traffic characteristics for further processing appeared first on Help Net Security.
- Open-source security debt grows across commercial softwareby Mirko Zorz on February 26, 2026 at 6:30 am
Open source code sits inside nearly every commercial application, and development teams continue to add new dependencies. Black Duck’s 2026 Open Source Security and Risk Analysis Report data shows that nearly all audited codebases contain open source components, with average component counts rising sharply over the past year. That growth brings a parallel increase in exposure. Mean vulnerabilities per codebase climbed from 280 to 581 in one year, more than doubling. Median vulnerabilities also rose. … More → The post Open-source security debt grows across commercial software appeared first on Help Net Security.
- Review: Digital Forensics, Investigation, and Response, 5th Editionby Mirko Zorz on February 26, 2026 at 6:00 am
Digital Forensics, Investigation, and Response, 5th Edition presents a structured survey of the digital forensics discipline. The book spans foundational principles, platform specific analysis, specialized branches, and incident response integration. About the author Chuck Easttom has many years of practical experience across a wide range of computer science, mathematics, and related fields. He holds a Doctor of Science in Cyber Security, a Ph.D. in Nanotechnology, a Ph.D. in Computer Science, and four master’s degrees. He … More → The post Review: Digital Forensics, Investigation, and Response, 5th Edition appeared first on Help Net Security.






