Category: HelpnetSecurity

Riverbed rolls out AI-powered tools to find and fix network issues faster
05
Aug
2025

Riverbed rolls out AI-powered tools to find and fix network issues faster

Riverbed launched its new AI-powered intelligent network observability solutions, enhancing network visibility for enterprise IT teams and enabling them to…

Millions of Dell laptops could be persistently backdoored in ReVault attacks
05
Aug
2025

Millions of Dell laptops could be persistently backdoored in ReVault attacks

A set of firmware vulnerabilities affecting 100+ Dell laptop models widely used in government settings and by the cybersecurity industry…

Manifest AI Risk turns weeks of model vetting into two clicks
05
Aug
2025

Manifest AI Risk turns weeks of model vetting into two clicks

Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance…

Cymulate's new platform turns threat validation into smarter defense
05
Aug
2025

Cymulate’s new platform turns threat validation into smarter defense

Cymulate announced the new Cymulate Exposure Management Platform, which validates, prioritizes and optimizes the entire security ecosystem – continuously. The…

Project Ire: Microsoft's autonomous malware detection AI agent
05
Aug
2025

Project Ire: Microsoft’s autonomous malware detection AI agent

Microsoft is working on a AI agent whose main goal is autonomous malware detection and the prototype – dubbed Project…

ExtraHop helps SOCs connect the dots with identity-driven detection
05
Aug
2025

ExtraHop helps SOCs connect the dots with identity-driven detection

ExtraHop unveiled new innovations to accelerate incident response, offering an understanding of cyberattacks by linking disparate detections to compromised identities….

New Reveal platform shines a light on post-login identity behavior
05
Aug
2025

New Reveal platform shines a light on post-login identity behavior

Reveal Security released the Reveal Platform, a solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed…

Ransomware groups shift to quadruple extortion to maximize pressure
05
Aug
2025

Ransomware groups shift to quadruple extortion to maximize pressure

Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach,…

Security tooling pitfalls for small teams: Cost, complexity, and low ROI
05
Aug
2025

Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large…

BloodHound 8.0 debuts with major upgrades in attack path management
05
Aug
2025

BloodHound 8.0 debuts with major upgrades in attack path management

SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded…

Back to basics webinar: The ecosystem of CIS Security best practices
05
Aug
2025

Back to basics webinar: The ecosystem of CIS Security best practices

Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all…

Your employees uploaded over a gig of files to GenAI tools last quarter
05
Aug
2025

Your employees uploaded over a gig of files to GenAI tools last quarter

In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered…