Spotting third-party cyber risk before attackers do

In this Help Net Security video, Jeffrey Wheatman, SVP and Cyber Strategist at Black Kite, discusses how organizations can identify and manage third-party cyber exposures before attackers exploit them. He argues that businesses should move beyond a dat… Continue reading Spotting third-party cyber risk before attackers do

Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The AI criminal mastermind is already hiring on gig platforms Labor-hire platforms let anyone with a credit card post a task and pay a stranger to complet… Continue reading Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months

How to spot a North Korean fake in a job interview

North Korean operatives are getting hired at companies by passing job interviews using fake identities and AI tools. In this Help Net Security video, Adrian Cheek, a senior cybercrime researcher at Flare, outlines several ways organizations can catch t… Continue reading How to spot a North Korean fake in a job interview

Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Bringing governance and visibility to machine and AI identities In this Help Net Security interview, Archit Lohokare, CEO of AppViewX, explains how the ri… Continue reading Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

What the EU AI Act requires for AI agent logging

The EU AI Act is 144 pages long. The logging requirements that matter for AI agent developers sit across four articles that keep referencing each other. Here’s what they say, when the deadlines hit, and where the gaps are. Your agent is probably high-r… Continue reading What the EU AI Act requires for AI agent logging

Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian

AI coding assistants are quickly becoming part of everyday development. Tools like Cursor, Claude Code, and GitHub Copilot can now do more than suggest code. They can read files, run shell commands, and call external tools during a session. That makes … Continue reading Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian

29 million leaked secrets in 2025: Why AI agents credentials are out of control

AI agents need credentials to work. They authenticate with LLM platforms, connect to databases, call SaaS APIs, access cloud resources, and orchestrate across dozens of external services. Every integration point requires an identity. Most organizations… Continue reading 29 million leaked secrets in 2025: Why AI agents credentials are out of control