AI agents can leak company data through simple web searches
When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as…
When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as…
In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to an evolving fraud landscape and…
Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data Breach Investigation Report, 60% of…
Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources that a server makes available,…
A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them…
Nozomi Networks announced a cybersecurity solution designed to safely automate threat response in operational environments. With the latest release of Nozomi Arc, users gain automated…
CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was used by unknown attackers to…
Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject in depth at IRISSCON 2025,…
Elastic announced Streams, an agentic AI-powered solution that rethinks how teams work with logs to enable much faster incident investigation and resolution. Streams uses AI…
FS has released its PicOS AI Switch System, a comprehensive networking solution engineered to support large-scale AI training, inference, and HPC workloads. By integrating advanced…
In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in…
Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet,…