News

Help Net Security
helpnetsecurity.com > 02/23/2026 > rich-kellen-iff-ot-lab-cybersecurity

The hidden security cost of treating labs like data centers

1+ hour, 2+ min ago  (437+ words) In this Help Net Security interview, Rich Kellen, VP, CISO at IFF, explains why security teams should not treat OT labs like IT environments. He discusses how compromise can damage scientific integrity and create safety risks that backups cannot fix....

Help Net Security
helpnetsecurity.com > 02/23/2026 > ai-agent-security-risks-enterprise

Enterprises are racing to secure agentic AI deployments

1+ hour, 32+ min ago  (705+ words) AI assistants are tied into ticketing systems, source code repositories, chat platforms, and cloud dashboards across many enterprises. In some environments, these systems can open pull requests, query internal databases, book services, and trigger automated workflows with limited human involvement....

Help Net Security
helpnetsecurity.com > 02/20/2026 > trustconnect-docconnect-fake-rmm

Criminals create business website to sell RAT disguised as RMM tool

2+ day, 18+ hour ago  (440+ words) A RAT masquerading as legitimate remote monitoring and management (RMM) software is being sold to cybercriminals as a service, Proofpoint researchers recently discovered. The fake RMM tool, called TrustConnect, was being marketed via an LLM-created website parked on trustconnectsoftware[.]com,…...

Help Net Security
helpnetsecurity.com > 02/20/2026 > applying-cybersecurity-tax-policies

Applying green energy tax policies to improve cybersecurity

3+ day, 1+ hour ago  (520+ words) For years, governments have focused only on the stick of compliance when they could leverage the carrot of tax incentives. Theoretically, compliance fines and penalties should act as a deterrent that improves accountability and reduces data breaches. However, many vendors…...

Help Net Security
helpnetsecurity.com > 02/19/2026 > grandstream-voip-phones-vulnerability-cve-2026-2329

Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)

3+ day, 19+ hour ago  (353+ words) A critical security vulnerability (CVE-2026-2329) in Grandstream VoIP phones could let hackers remotely take full control of the devices and even intercept calls, Rapid7 researchers discovered. "The vulnerability is present in the device's web-based API service, and is accessible in a…...

Help Net Security
helpnetsecurity.com > 02/19/2026 > microsoft-project-silica-data-storage-technology

Microsoft signals breakthrough in data storage that can last for generations

3+ day, 22+ hour ago  (176+ words) Close up of Writer showing high-speed multi-beam data encoding on laser pulses (Source: Microsoft) Rising global data volumes increase the need for storage that can last for generations. Researchers believe this technology could preserve information for up to 10,000 years. Richard…...

Help Net Security
helpnetsecurity.com > 02/18/2026 > securonix-sam-agentic-mesh

Securonix shifts security operations to measurable AI-driven productivity

4+ day, 16+ hour ago  (549+ words) Securonix announced Sam, the AI SOC Analyst, and the Securonix Agentic Mesh, introducing a new operating model for security operations that scales analyst productivity, governs AI in production, and delivers board-ready outcomes. Sam is Securonix's AI SOC Analyst. It is…...

Help Net Security
helpnetsecurity.com > 02/18/2026 > cloud-range-ai-validation-range

Cloud Range launches AI Validation Range to safely test and secure AI before deployment

4+ day, 17+ hour ago  (456+ words) Cloud Range has introduced its AI Validation Range, a secure, contained virtual cyber range that enables organizations to test, train, and validate AI models, applications, and autonomous agents without risking exposure of sensitive production data. AI adoption is accelerating faster…...

@ISC2
helpnetsecurity.com > 02/17/2026 > webinar-isc2-exam-prep

ISC2 Knowledge Vault Webinars—Cybersecurity Discussions

5+ day, 17+ hour ago  (154+ words) Ready to get certified but not sure where to start? Get insider tips and tricks on what to do from day one to test day. Join ISC2-certified instructors and an audience of your peers for this live interactive webinar on…...

Help Net Security
helpnetsecurity.com > 02/17/2026 > ot-cybersecurity-threats-2026-research

OT teams are losing the time advantage against industrial threat actors

5+ day, 17+ hour ago  (397+ words) Dragos tracked 26 threat groups targeting OT environments, including three new groups identified in 2025: AZURITE, PYROXENE, and SYLVANITE. The activity across these groups shows more specialization and a growing division of labor, where one team focuses on gaining access and another…...