Aggregator
Shadow AI risks deepen as 31% of users get no employer training
Between one-fifth and one-third of workers use AI outside the influence and governance of the IT function, according to a global survey of 6,000 full-time employees at enterprise organizations. Researchers found a widening gap between employee AI adoption and the controls organizations have in place to manage it. The Lenovo Work Reborn Research Series 2026 report documents a workforce split into two groups: employees equipped with IT-managed tools, training, and oversight, and those operating independently … More →
The post Shadow AI risks deepen as 31% of users get no employer training appeared first on Help Net Security.
Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets
Wireshark, the world’s most widely used open-source network protocol analyzer, has released a major security update addressing over 40 vulnerabilities, several of which enable arbitrary code execution through malformed packet injection or malicious capture files. Organizations and individuals relying on Wireshark for network monitoring, forensics, and traffic analysis should update immediately to Wireshark 4.6.5. Critical […]
The post Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets appeared first on Cyber Security News.
258 древних ДНК переписали падение Рима. Варвары разрушили империю… но стали римлянами сами
Announcing PAI 5.0
Identity is the control plane for distributed infrastructure
Teleport CEO Ev Kontsevoy makes the case that distributed infrastructure, across cloud, Kubernetes, databases, and servers, can’t be secured by layering more tools on top of fragmented identity systems. He argues for fewer credentials, fewer entry points, and a single identity layer that gives security and engineering teams unified visibility and control.
The post Identity is the control plane for distributed infrastructure appeared first on Help Net Security.
Deterministic Routing: The Hidden Key to Low Latency
MCP Servers Are a Supply Chain You Have Not Inventoried Yet
«Мы больше ничего не можем доказать до конца». Учёные поняли: вся математика держится на честном слове
AI traffic is getting bigger, louder, and less predictable
AI workflows need storage that supports repeated movement across the model lifecycle. Large datasets are ingested, transformed, exported for training, pulled back for evaluation, and refreshed as models evolve. Backblaze’s Q1 2026 Network Stats report says this creates a shift from diffuse internet-style traffic to large, high-bandwidth flows between fewer endpoints. Monthly view of all bits transferred to each network type (2025-05 to current) (Source: Backblaze) “From a network perspective, this represents a meaningful shift … More →
The post AI traffic is getting bigger, louder, and less predictable appeared first on Help Net Security.
微软深度解析:2026年Q1邮件威胁格局——83亿次钓鱼、二维码暴增146%、Tycoon2FA遭打击
Anthropic Launches Claude Security in Public Beta for Enterprise Customers
Anthropic has opened Claude Security to public beta for Claude Enterprise customers, bringing AI-powered vulnerability detection directly into production codebases without the need for custom tooling or API integrations. Claude Security leverages the Opus 4.7 model to perform end-to-end security analysis across your codebase. The platform scans for vulnerabilities, validates each finding to reduce false […]
The post Anthropic Launches Claude Security in Public Beta for Enterprise Customers appeared first on Cyber Security News.
CVE-2026-31431 真的只值 7.8 么
CVE-2026-31431:我用 DeepSeek 复现了 AI 发现Copy Fail 提权的全过程
«Приятно познакомиться, Боб». IBM выпустила единую платформу для управления ИИ-агентами
New infosec products of the month: April 2026
Here’s a look at the most interesting products from the past month, featuring releases from Advenica, Aptori, Axonius, Broadcom, GlobalSign, Intruder, IP Fabric, Mallory, Secureframe, Siemens, Sitehop, and Virtue AI. Mallory brings contextual threat intelligence to security operations Mallory is launching an AI-native threat intelligence platform that monitors thousands of threat sources, contextualizes them against your actual attack surface, and puts that intelligence to work across hunting, detection, and exposure management use cases. One platform. … More →
The post New infosec products of the month: April 2026 appeared first on Help Net Security.