AI’s split personality: Solving crimes while helping conceal them

What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its ability to conceal them. A new study from the University of Cagliari digs in… Continue reading AI’s split personality: Solving crimes while helping conceal them

10 data security companies to watch in 2026

At Help Net Security, we’ve been tracking the cybersecurity world for nearly three decades. Through our Industry News section, we’ve watched countless companies rise, and push the limits of what’s possible in data protection. Some vendors consistently … Continue reading 10 data security companies to watch in 2026

Why ex-military professionals are a good fit for cybersecurity

After years of working as part of a team, many military veterans look for work that still carries meaning, challenge, and purpose. Cybersecurity offers a new way to serve and protect on a different battlefield. Earlier this year, the Department of Vete… Continue reading Why ex-military professionals are a good fit for cybersecurity

Nodepass: Open-source TCP/UDP tunneling solution

When you think of network tunneling, “lightweight” and “enterprise-grade” rarely appear in the same sentence. NodePass, an open-source project, wants to change that. It’s a compact but powerful TCP/UDP tunneling solution built for DevOps teams and syst… Continue reading Nodepass: Open-source TCP/UDP tunneling solution

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that can be hacked through Bluetooth Their tests show that anyone within Bluetooth… Continue reading Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam

The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal prosecutors in Brooklyn have charged Chen Zhi, also kn… Continue reading U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam

Maltrail: Open-source malicious traffic detection system

Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists, as well as static lists compiled from antivirus reports and user-defined … Continue reading Maltrail: Open-source malicious traffic detection system

The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components. Study design showing … Continue reading The diagnosis is in: Mobile health apps are bad for your privacy

The solar power boom opened a backdoor for cybercriminals

Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in the transition. Cyber threats expose weak spots in solar power systems Until… Continue reading The solar power boom opened a backdoor for cybercriminals