Category: HelpnetSecurity

ScamAgent shows how AI could power the next wave of scam calls
28
Aug
2025

ScamAgent shows how AI could power the next wave of scam calls

Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get…

Where security, DevOps, and data science finally meet on AI strategy
28
Aug
2025

Where security, DevOps, and data science finally meet on AI strategy

AI infrastructure is expensive, complex, and often caught between competing priorities. On one side, security teams want strong isolation and…

Can AI make threat intelligence easier? One platform thinks so
28
Aug
2025

Can AI make threat intelligence easier? One platform thinks so

When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t…

How CISOs are balancing risk, pressure and board expectations
28
Aug
2025

How CISOs are balancing risk, pressure and board expectations

AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security…

Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius
27
Aug
2025

Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius

A threat group Google tracks as UNC6395 has pilfered troves of data from Salesforce corporate instances, in search of credentials…

AI is becoming a core tool in cybercrime, Anthropic warns
27
Aug
2025

AI is becoming a core tool in cybercrime, Anthropic warns

A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings…

300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158
27
Aug
2025

300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158

Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which Plex…

Hottest cybersecurity open-source tools of the month: August 2025
27
Aug
2025

Hottest cybersecurity open-source tools of the month: August 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source…

AI Security Map: Linking AI vulnerabilities to real-world impact
27
Aug
2025

AI Security Map: Linking AI vulnerabilities to real-world impact

A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours….

How compliance teams can turn AI risk into opportunity
27
Aug
2025

How compliance teams can turn AI risk into opportunity

AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new…

What CISOs can learn from Doppel's new AI-driven social engineering simulation
27
Aug
2025

What CISOs can learn from Doppel’s new AI-driven social engineering simulation

Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool…

Social media apps that aggressively harvest user data
27
Aug
2025

Social media apps that aggressively harvest user data

Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some…