How to spot a North Korean fake in a job interview

North Korean operatives are getting hired at companies by passing job interviews using fake identities and AI tools. In this Help Net Security video, Adrian Cheek, a senior cybercrime researcher at Flare, outlines several ways organizations can catch t… Continue reading How to spot a North Korean fake in a job interview

Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Bringing governance and visibility to machine and AI identities In this Help Net Security interview, Archit Lohokare, CEO of AppViewX, explains how the ri… Continue reading Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

What the EU AI Act requires for AI agent logging

The EU AI Act is 144 pages long. The logging requirements that matter for AI agent developers sit across four articles that keep referencing each other. Here’s what they say, when the deadlines hit, and where the gaps are. Your agent is probably high-r… Continue reading What the EU AI Act requires for AI agent logging

Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian

AI coding assistants are quickly becoming part of everyday development. Tools like Cursor, Claude Code, and GitHub Copilot can now do more than suggest code. They can read files, run shell commands, and call external tools during a session. That makes … Continue reading Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian

29 million leaked secrets in 2025: Why AI agents credentials are out of control

AI agents need credentials to work. They authenticate with LLM platforms, connect to databases, call SaaS APIs, access cloud resources, and orchestrate across dozens of external services. Every integration point requires an identity. Most organizations… Continue reading 29 million leaked secrets in 2025: Why AI agents credentials are out of control

Week in review: Windows zero-day exploit leaked, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day Cloudflare announced it is targeting 2029 to complete post-quantum s… Continue reading Week in review: Windows zero-day exploit leaked, Patch Tuesday forecast

April 2026 Patch Tuesday forecast: Spring-cleaning of a preview

I just blinked and the first quarter of the year is GONE. Where does the time go? I looked back at my article from last month where I touched on the use of AI and some of the vulnerabilities associated with it and realized it was good precursor to some… Continue reading April 2026 Patch Tuesday forecast: Spring-cleaning of a preview