
Cybersecurity

How cybersecurity leaders can defend against the spur of AI-driven NHI
Machine identities pose a big security risk for enterprises, and that risk will be magnified dramatically as AI agents are deployed. According to a report by cybersecurity vendor CyberArk, machine identities — also known as non-human identities (NHI) — now outnumber humans by 82 to 1, and their number is expected to increase exponentially. By…

What Are Some Ways To Diversify Your Crypto Portfolio In 2025?
Data from research suggests that the global cryptocurrency market will at least triple by 2030, increasing to an amount of nearly $5 billion. Once the holistic use of AI is fully incorporated into this infrastructure, data management, crypto-economics, and our money are poised to see significant growth and work smarter. Just when we think Bitcoin…

Tracer AI combats fraud, counterfeits and narrative attacks in ChatGPT – Help Net Security
Tracer AI launched Tracer Protect for ChatGPT, a solution that protects brands from the reputational harm being propagated at machine scale via AI chatbots by bad actors. The rising popularity of generative AI (genAI) engines is driving the urgent and rapidly evolving brand security threat vector faced by enterprises. Tracer Protect for ChatGPT actively monitors…

Using AI to identify cybercrime masterminds
Online criminal forums, both on the public internet and on the “dark web” of Tor .onion sites, are a rich resource for threat intelligence researchers. The Sophos Counter Threat Unit (CTU) have a team of darkweb researchers collecting intelligence and interacting with darkweb forums, but combing through these posts is a time-consuming and resource-intensive task,…

Operation FishMedley targeting governments, NGOs, and think tanks
On March 5th, 2025, the US DOJ unsealed an indictment against employees of the Chinese contractor I‑SOON for their involvement in multiple global espionage operations. Those include attacks that we previously documented and attributed to the FishMonger APT group – I‑SOON’s operational arm – including the compromise of seven organizations that we identified as being…

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering
The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that end, the agency said it’s actively working with aviation and industry partners to combat the activity and help victims. “These actors rely on social engineering…

12 Top DevSecOps Tools to Secure Each Step of the SDLC | TechTarget
DevSecOps has transformed software development, taking security from a bolted-on afterthought to an integral part of the process. Security decisions and implementation now happen in real time alongside development. DevSecOps success hinges on choosing the right security tools and embedding them at every stage of the software development lifecycle (SDLC) — from initial code…

How an Email, Crypto Wallet and YouTube Activity Led the FBI to IntelBroker
Authorities in the United States have charged a British national, Kai Logan West, widely known online as “IntelBroker“, with a series of high-profile data breaches that collectively caused at least $25 million in damages to companies worldwide. The 23-year-old was arrested in France in February 2025 and now faces extradition to the United States to…

Money mule networks evolve into hierarchical, business-like criminal enterprises – Help Net Security
In this Help Net Security interview, Michal Tresner, CEO of ThreatMark, discusses how cybercriminals are weaponizing AI, automation, and social engineering to industrialize money mule operations. He looks at how these networks have changed and how behavioral intelligence is helping to catch fraud. Tresner also shares practical tips for CISOs trying to stop mule activity…