Category: HelpnetSecurity

Your photo could be all AI needs to clone your voice
30
Oct
2025

Your photo could be all AI needs to clone your voice

A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study…

How neighbors could spy on smart homes
30
Oct
2025

How neighbors could spy on smart homes

Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University…

How the City of Toronto embeds security across governance and operations
30
Oct
2025

How the City of Toronto embeds security across governance and operations

In this Help Net Security interview, Andree Noel, Deputy CISO at City of Toronto, discusses how the municipality strengthens its…

Hottest cybersecurity open-source tools of the month: October 2025
30
Oct
2025

Hottest cybersecurity open-source tools of the month: October 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source…

Email breaches are the silent killers of business growth
30
Oct
2025

Email breaches are the silent killers of business growth

78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach…

ZEST Security launches free AI-based remediation risk assessment for security teams
29
Oct
2025

ZEST Security launches free AI-based remediation risk assessment for security teams

ZEST Security announced its free remediation risk assessment. The industry is overflowing with tools to identify vulnerabilities, but these tools…

OpenAI’s gpt-oss-safeguard enables developers to build safer AI
29
Oct
2025

OpenAI’s gpt-oss-safeguard enables developers to build safer AI

OpenAI is releasing a research preview of gpt-oss-safeguard, a set of open-weight reasoning models for safety classification. The models come…

Sanctions won’t stop cyberattacks, but they can still "bite"
29
Oct
2025

Sanctions won’t stop cyberattacks, but they can still “bite”

Sanctions are one of the tools Western governments use when they want to hit back at state-sponsored cyber threat actors….

Commvault introduces Data Rooms to securely connect backup data with AI platforms
29
Oct
2025

Commvault introduces Data Rooms to securely connect backup data with AI platforms

Commvault introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI…

Python Foundation rejects US government grant earmarked for security improvements
29
Oct
2025

Python Foundation rejects US government grant earmarked for security improvements

The Python Software Foundation (PSF) has rejected a $1.5 million government grant due to restrictive conditions that would force the…

Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping
29
Oct
2025

Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping

Privado.ai released several new capabilities to automate privacy assessments and data maps for privacy teams amid growing privacy enforcement for…

Palo Alto Networks launches Prisma AIRS 2.0 to deliver end-to-end security across the AI lifecycle
29
Oct
2025

Palo Alto Networks launches Prisma AIRS 2.0 to deliver end-to-end security across the AI lifecycle

Palo Alto Networks announced Prisma AIRS 2.0, a major platform upgrade that completes the native integration of recently acquired Protect…