Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3 XL. It’s called the NetHunter C-deck, and it packs serious functionality into a small, 3D-printed shell. NetHunter C-deck v2.1.0 The … Continue reading Build a mobile hacking rig with a Pixel and Kali NetHunter

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment

OWASP Nettacker is a free, open-source tool designed for network scanning, information gathering, and basic vulnerability assessment. Built and maintained by the OWASP community, Nettacker helps security pros automate common tasks like port scanning, s… Continue reading OWASP Nettacker: Open-source scanner for recon and vulnerability assessment

How to build AI into your business without breaking compliance

AI is supposed to make businesses faster, smarter, and more competitive, but most projects fall short. The Cloud Security Alliance (CSA) says the real issue is companies cramming AI into old, rigid processes that just can’t keep up. “AI adoption in bus… Continue reading How to build AI into your business without breaking compliance

Android Enterprise update puts mobile security first

Google is rolling out new Android Enterprise features aimed at improving mobile security, IT management, and employee productivity. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. … Continue reading Android Enterprise update puts mobile security first

The legal questions to ask when your systems go dark

At Span Cyber Security Arena, I sat down with Iva Mišković, Partner at the ISO-certified Mišković & Mišković law firm, to discuss the role of legal teams during cyber incidents. She shared why lawyers should assume the worst, coordinate quickly, a… Continue reading The legal questions to ask when your systems go dark

AI threats leave SecOps teams burned out and exposed

Security teams are leaning hard into AI, and fast. A recent survey of 500 senior cybersecurity pros at big U.S. companies found that 86% have ramped up their AI use in the past year. The main reason? They’re trying to keep up with a surge in AI-p… Continue reading AI threats leave SecOps teams burned out and exposed

Balancing cybersecurity and client experience for high-net-worth clients

In this Help Net Security interview, Renana Friedlich-Barsky, EVP and CISO at LPL Financial, discusses how threat actors are targeting high-net-worth clients and exploiting digital touchpoints in wealth management. She explains why firms must embed sec… Continue reading Balancing cybersecurity and client experience for high-net-worth clients

CISOs, are you ready for cyber threats in biotech?

The threat landscape in the bioeconomy is different from what most CISOs are used to. It includes traditional risks like data breaches, but the consequences are more complex. A compromise of genomic databases, for example, does not just expose personal… Continue reading CISOs, are you ready for cyber threats in biotech?

fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic

fiddleitm is an open-source tool built on top of mitmproxy that helps find malicious web traffic. It works by checking HTTP requests and responses for known patterns that might point to malware, phishing, or other threats. fiddleitm features “I c… Continue reading fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic

Why IAM should be the starting point for AI-driven cybersecurity

In this Help Net Security interview, Benny Porat, CEO at Twine Security, discusses applying AI agents to security decisions. He explains why identity and access management (IAM) is the ideal starting point for both augmentation and automation, and shar… Continue reading Why IAM should be the starting point for AI-driven cybersecurity