News Archives – Help Net Security Daily information security news with a focus on enterprise security.
- Google unveils new AI and cloud security capabilities at Security Summitby Sinisa Markovic on August 19, 2025 at 4:00 pm
Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations centers, enhancements in cloud security, and extended safeguards for enterprise browsing. New dashboards in Google Security Operations showcasing the native integration of SOAR data AI security takes the spotlight AI security took center stage with the debut of new … More → The post Google unveils new AI and cloud security capabilities at Security Summit appeared first on Help Net Security.
- Webinar: Why AI and SaaS are now the same attack surfaceby Help Net Security on August 19, 2025 at 2:54 pm
The lines between SaaS and AI are vanishing. AI agents are now first-class citizens in your SaaS universe: accessing sensitive data, triggering workflows, and introducing new risks that legacy SaaS security posture management tools (SSPM) miss. Security teams are discovering that managing SaaS in isolation from AI is a recipe for dangerous blind spots. What you’ll learn in this webinar: How SaaS and AI have converged into a single, dynamic attack surface Key findings from … More → The post Webinar: Why AI and SaaS are now the same attack surface appeared first on Help Net Security.
- Android VPN apps used by millions are covertly connected AND insecureby Zeljka Zorz on August 19, 2025 at 2:06 pm
Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Finding the secret links Virtual private networks (VPNs) are widely marketed as tools for enhancing privacy, securing internet traffic, and shielding users from surveillance. Unfortunately, the consumer VPN ecosystem is decidedly opaque, making it difficult (and sometime impossible) for users to make an evidence-based decision … More → The post Android VPN apps used by millions are covertly connected AND insecure appeared first on Help Net Security.
- Git 2.51: Preparing for the future with SHA-256by Anamarija Pogorelec on August 19, 2025 at 6:36 am
Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes several technical changes, but one of the most important areas of work is Git’s move toward stronger cryptographic security through SHA-256 support. Git has relied on SHA-1 since its creation in 2005. SHA-1 has been showing its age for years, with researchers demonstrating collision attacks that make it unsuitable for long-term use. The community has … More → The post Git 2.51: Preparing for the future with SHA-256 appeared first on Help Net Security.
- What happens when penetration testing goes virtual and gets an AI coachby Mirko Zorz on August 19, 2025 at 6:00 am
Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the University of Bari Aldo Moro propose using Cyber Digital Twins (CDTs) and generative AI to create realistic, interactive environments for cybersecurity education. Their framework simulates IT, OT, and IoT systems in a controlled virtual space and layers AI-driven feedback on top. The goal is to improve penetration testing skills … More → The post What happens when penetration testing goes virtual and gets an AI coach appeared first on Help Net Security.
- The cybersecurity myths companies can’t seem to shakeby Sinisa Markovic on August 19, 2025 at 5:00 am
Cybersecurity myths are like digital weeds: pull one out, and another quickly sprouts in its place. You’ve probably heard them before: Macs don’t get viruses, we’re too small to be a target, or changing passwords often keeps us safer. Experts have been busting these myths for years, yet they still stick around and shape bad strategies while giving people a false sense of security. Myth 1: AI can replace your security team No matter how … More → The post The cybersecurity myths companies can’t seem to shake appeared first on Help Net Security.
- What makes airport and airline systems so vulnerable to attack?by Help Net Security on August 19, 2025 at 4:30 am
In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex aviation ecosystem, from legacy systems and third-party vendors to the challenges of testing in safety-critical environments. Ozdag emphasizes the importance of packet-level monitoring, real-time validation, and a zero-trust mindset, urging aviation leaders to treat cybersecurity as a core element of safety, not just compliance. The post What makes airport and airline systems so vulnerable to attack? appeared first on Help Net Security.
- Cybersecurity jobs available right now: August 19, 2025by Sinisa Markovic on August 19, 2025 at 4:00 am
Senior Cybersecurity Analyst DOT Security | USA | On-site – View job details As a Senior Cybersecurity Analyst, you will lead the investigation of real-time alerts from SIEM platforms and other security tools, ensuring timely identification of potential threats. You will also perform in-depth forensic analysis of firewall logs, IDS/IPS alerts, and packet captures to validate or dismiss security events Principal Security Engineer Punt | Canada | On-site – View job details As a Principal … More → The post Cybersecurity jobs available right now: August 19, 2025 appeared first on Help Net Security.
- New NIST guide explains how to detect morphed imagesby Sinisa Markovic on August 18, 2025 at 2:38 pm
Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure places. These morphed images can trick face recognition systems into linking the photo to both people, allowing one person to pass as the other. Face morphing software can blend photos of different people’s faces into a single synthesized image (Source: NIST) This kind of software is easy to … More → The post New NIST guide explains how to detect morphed images appeared first on Help Net Security.
- Noodlophile infostealer is hiding behind fake copyright and PI infringement noticesby Zeljka Zorz on August 18, 2025 at 1:05 pm
Attackers pushing the Noodlophile infostealer are targeting businesses with spear-phishing emails threatening legal action due to copyright or intellectual property infringement, Morphisec researchers have warned. The campaign The emails, ostensibly sent by a law firm, are tailored to the recipients: they mention details like specific Facebook Page IDs and company ownership information, and are being sent to key employees or generic inboxes (e.g., info@, support@) of various businesses and enterprises across US, Europe, Baltic countries … More → The post Noodlophile infostealer is hiding behind fake copyright and PI infringement notices appeared first on Help Net Security.