Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How to protect the global cable network The resilience of the world’s submarine cable network is under new pressure from geopolitical tensions, supply chain risks, and slow repair processes. A new report from the Center for Cybersecurity Policy and Law outlines how governments and industry can work together to strengthen this critical infrastructure. Cyber risk ...| Help Net Security
You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads and loads a machine learning model? A recent study shows why you should. Researchers from Politecnico di Milano found that loading a shared model can be just as risky as running untrusted code. In their tests, they uncovered six previously unknown flaws in popular machine learning … More → The post When loading a mo...| Help Net Security
Protegrity Developer Edition enables developers, data scientists, ML engineers, and security teams an easy way to add data protection into GenAI and unstructured data workflows, without the need for enterprise setup. Billed as the first enterprise-grade, governance-focused Python package, it is built to help teams create secure, well-governed data pipelines and AI workflows from the ground up. Protegrity Developer Edition removes common barriers to evaluation and experimentation with a lightw...| Help Net Security
SIEMs excel at correlating events and firing alerts, but their ingest pipelines can get overwhelmed when scaled. And because most SIEMs rely on general-purpose log storage platforms, even with lower-cost archive tiers, long-term retention at full fidelity remains expensive, forcing teams to choose between visibility and budget. With AI making the threat landscape more complex and the government issuing mandates requiring companies to report incidents quickly, defenders need tools that help th...| Help Net Security
Americans are dealing with a growing wave of digital scams, and many are losing money in the process. According to the fourth annual Consumer Cyber Readiness Report, nearly half of U.S. adults have been targeted by cyberattacks or scams, and one in ten lost money as a result. Text scams are on the rise The survey found that text and messaging apps have become a growing source of scams. Three in ten people who experienced … More → The post Passkeys rise, but scams still hit hard in 2025 ap...| Help Net Security
Apple’s release of macOS 26 Tahoe introduced a new disk image format and updated an older one, both of which are drawing attention from system testers and forensic examiners. Apple Sparse Image Format (ASIF) The Apple Sparse Image Format (ASIF) is a single-file sparse disk image. Although it can be assigned a large nominal capacity, it only consumes space on the host volume as data is written. ASIF containers can be formatted with the file … More → The post Apple strengthens storage fle...| Help Net Security
Companies are pouring money into AI for IT operations, but most projects are still far from maturity. A global survey of 1,200 business leaders, IT leaders, and technical specialists found that while spending and confidence are rising, only 12% of AI initiatives have been fully deployed. The report, authored by Riverbed, suggests that optimism at the executive level is colliding with challenges in data quality, tool complexity, and everyday IT performance. Most AI projects remain … More →...| Help Net Security
Here’s a look at the most interesting products from the past week, featuring releases from Acronis, Legit Security, NowSecure, Siemens, and Telus. NowSecure Privacy helps organizations protect mobile apps from data leaks NowSecure announced the release of NowSecure Privacy, a privacy solution for mobile applications. With this launch, developers, security teams, and privacy professionals gain the capabilities needed to identify and fix systemic blind spots that compromise mobile application...| Help Net Security
The Crimson Collective, an emerging extortion / hacker group, has made a bombshell claim on their Telegram channel: they have gained access to Red Hat’s GitLab and have exfiltrated data from over 28,000 internal repositories connected to the company’s consulting business. What data was allegedly compromised? Red Hat is the U.S.-based open-source enterprise software company known for providing Linux, cloud, container, and automation platforms for enterprises. Its professional services arm ...| Help Net Security
The OpenSSL Project has announced the release of OpenSSL 3.6.0, a feature update that brings functionality improvements, standards compliance.| Help Net Security