Category: HelpnetSecurity

Netcraft launches Phone Scam Disruption to stop brand impersonation calls and texts
15
Oct
2025

Netcraft launches Phone Scam Disruption to stop brand impersonation calls and texts

Netcraft unveiled a new solution to help protect organizations’ customers from scam texts and phone calls that impersonate their brand….

Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots
15
Oct
2025

Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots

Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow…

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks
15
Oct
2025

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks

Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams…

A safer way to break industrial systems (on purpose)
15
Oct
2025

A safer way to break industrial systems (on purpose)

Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin…

Maltrail: Open-source malicious traffic detection system
15
Oct
2025

Maltrail: Open-source malicious traffic detection system

Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic…

The diagnosis is in: Mobile health apps are bad for your privacy
15
Oct
2025

The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store…

The power grid is getting old, and so is the cybersecurity protecting it
15
Oct
2025

The power grid is getting old, and so is the cybersecurity protecting it

Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built…

Regula simplifies identity verification with its new all-in-one IDV Platform
14
Oct
2025

Regula simplifies identity verification with its new all-in-one IDV Platform

Regula has launched its Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management…

What Chat Control means for your privacy
14
Oct
2025

What Chat Control means for your privacy

The EU’s proposed Chat Control (CSAM Regulation) aims to combat child sexual abuse material by requiring digital platforms to detect,…

What if your privacy tools could learn as they go?
14
Oct
2025

What if your privacy tools could learn as they go?

A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how…

The solar power boom opened a backdoor for cybercriminals
14
Oct
2025

The solar power boom opened a backdoor for cybercriminals

Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service…

Security validation: The key to maximizing ROI from security investments
14
Oct
2025

Security validation: The key to maximizing ROI from security investments

Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern…