The exploit gap is closing, and your patch cycle wasn’t built for this

The Cloud Security Alliance has published a briefing on what it calls a turning point in the threat landscape: the time between a vulnerability being discovered and a working exploit is shrinking fast. The briefing centers on Anthropic’s Claude M… Continue reading The exploit gap is closing, and your patch cycle wasn’t built for this

Coordinated vulnerability disclosure is now an EU obligation, but cultural change takes time

In this Help Net Security interview, Nuno Rodrigues Carvalho, Head of Sector for Incident and Vulnerability Services at ENISA, discusses the recent CVE funding scare and what it exposed about the fragility of global vulnerability disclosure infrastruct… Continue reading Coordinated vulnerability disclosure is now an EU obligation, but cultural change takes time

Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready

In this Help Net Security interview, Idan Habler, AI Security Researcher at Cisco, breaks down a threat most security teams haven’t named yet: agentic memory as an attack surface. Habler walks through MemoryTrap, a disclosed and remediated method… Continue reading Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready

Review: The Psychology of Information Security

Security controls fail when they are designed without regard for the people who must use them. That is the central argument of Leron Zinatullin’s second edition, and it is an argument he builds methodically across 17 chapters that draw from organ… Continue reading Review: The Psychology of Information Security

Fixing vulnerability data quality requires fixing the architecture first

In this Help Net Security interview, Art Manion, Deputy Director at Tharros, examines why vulnerability data across repositories stays inconsistent and hard to trust. The problem starts with systems not designed to collect or manage that data well. The… Continue reading Fixing vulnerability data quality requires fixing the architecture first

ZeroID: Open-source identity platform for autonomous AI agents

ZeroID is an open-source identity platform that implements an identity and credentialing layer specifically for autonomous agents and multi-agent systems. The attribution problem The core issue ZeroID targets is attribution in agentic workflows. When a… Continue reading ZeroID: Open-source identity platform for autonomous AI agents

MITRE releases a shared fraud-cyber framework built from real attack data

Financial fraud losses in the United States reached $16.6 billion in 2024, up from $4.2 billion in 2020. Behind those numbers is a structural problem: the teams responsible for stopping fraud, fraud investigators and cybersecurity analysts, have histor… Continue reading MITRE releases a shared fraud-cyber framework built from real attack data

Bringing governance and visibility to machine and AI identities

In this Help Net Security interview, Archit Lohokare, CEO of AppViewX, explains how the rise of AI marked a turning point where machine and AI agent identities began converging into a single problem. Drawing on his experience across IBM and CyberArk, h… Continue reading Bringing governance and visibility to machine and AI identities

To counter cookie theft, Chrome ships device-bound session credentials

Cookie theft follows a well-established pattern. Infostealer malware infiltrates a device, extracts authentication cookies, and exfiltrates them to an attacker-controlled server. Because cookies often have extended lifetimes, attackers can access accou… Continue reading To counter cookie theft, Chrome ships device-bound session credentials