Category: HelpnetSecurity

AI vs. you: Who’s better at permission decisions?
04
Dec
2025

AI vs. you: Who’s better at permission decisions?

A single tap on a permission prompt can decide how far an app reaches into a user’s personal data. Most…

The quantum clock is ticking and businesses are still stuck in prep mode
04
Dec
2025

The quantum clock is ticking and businesses are still stuck in prep mode

Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens…

Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
03
Dec
2025

Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say

A sprawling network that’s seemingly maintained to serve (illegal) online gambling opportunities and deliver malware to Indonesian citizens is likely…

BlackFog releases ADX Vision to block data loss from unapproved AI use
03
Dec
2025

BlackFog releases ADX Vision to block data loss from unapproved AI use

BlackFog announced the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX…

Threat intelligence programs are broken, here is how to fix them
03
Dec
2025

Threat intelligence programs are broken, here is how to fix them

Security teams often gather large amounts of threat data but still struggle to improve detection or response. Analysts work through…

Datadog introduces Bits AI SRE to automate alert investigation and root cause analysis
03
Dec
2025

Datadog introduces Bits AI SRE to automate alert investigation and root cause analysis

Datadog has launched Bits AI SRE, an AI agent aware of telemetry, architecture, and organizational context that investigates alerts and…

Global law enforcement actions put pressure on cybercrime networks
03
Dec
2025

Global law enforcement actions put pressure on cybercrime networks

In 2025, law enforcement agencies disrupted the infrastructure and operations of established cybercriminal groups. These groups shift across borders, and…

Portmaster: Open-source application firewall - Help Net Security
03
Dec
2025

Portmaster: Open-source application firewall – Help Net Security

Portmaster is a free and open source application firewall built to monitor and control network activity on Windows and Linux….

CISOs are questioning what a crisis framework should look like
03
Dec
2025

CISOs are questioning what a crisis framework should look like

CISOs increasingly assume the next breach is coming. What concerns them most is whether their teams will understand the incident…

Forward Edge-AI delivers quantum-safe data diode and earns communications patent
02
Dec
2025

Forward Edge-AI delivers quantum-safe data diode and earns communications patent

Forward Edge-AI announced two major milestones in advancing quantum-resistant communications: the United States Patent and Trademark Office (USPTO) has issued…

Google fixes Android vulnerabilities "under targeted exploitation" (CVE-2025-48633, CVE-2025-48572)
02
Dec
2025

Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)

Google has shipped patches for 51 Android vulnerabilities, including two high-severity flaws (CVE-2025-48633, CVE-2025-48572) that “may be under limited, targeted…

Span Cyber Security Arena 2026 to offer new perspectives on the development of cybersecurity
02
Dec
2025

Span Cyber Security Arena 2026 to offer new perspectives on the development of cybersecurity

Through lectures, deep-dive presentations, best practice examples, and masterclasses, the focus of Span Cyber Security Arena 2026 will be on…