cyber risk

Cyberattacks are changing the game for major sports events

Cyberattacks are changing the game for major sports events 2025-07-08 at 08:32 By Sinisa Markovic Sports fans and cybercriminals both look forward to major sporting events, but for very different reasons. Fake ticket sites, stolen login details, and DDoS attacks are common ways criminals try to make money or disrupt an event. Why are sports […]

React to this headline:

Loading spinner

Cyberattacks are changing the game for major sports events Read More »

You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code

You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code 2025-07-03 at 16:03 By Zeljka Zorz Popular AI chatbots powered by large language models (LLMs) often fail to provide accurate information on any topic, but researchers expect threat actors to ramp up their efforts to get them to spew

React to this headline:

Loading spinner

You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code Read More »

Cybersecurity essentials for the future: From hype to what works

Cybersecurity essentials for the future: From hype to what works 2025-07-02 at 09:03 By Mirko Zorz Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted. But at the end of the day, the goal stays

React to this headline:

Loading spinner

Cybersecurity essentials for the future: From hype to what works Read More »

Federal Reserve System CISO on aligning cyber risk management with transparency, trust

Federal Reserve System CISO on aligning cyber risk management with transparency, trust 2025-07-01 at 09:08 By Mirko Zorz In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy. She explains how the Fed assesses potential disruptions to financial stability and

React to this headline:

Loading spinner

Federal Reserve System CISO on aligning cyber risk management with transparency, trust Read More »

How cybercriminals are weaponizing AI and what CISOs should do about it

How cybercriminals are weaponizing AI and what CISOs should do about it 2025-07-01 at 08:31 By Mirko Zorz In a recent case tracked by Flashpoint, a finance worker at a global firm joined a video call that seemed normal. By the end of it, $25 million was gone. Everyone on the call except the employee

React to this headline:

Loading spinner

How cybercriminals are weaponizing AI and what CISOs should do about it Read More »

Most AI and SaaS apps are outside IT’s control

Most AI and SaaS apps are outside IT’s control 2025-06-26 at 07:08 By Help Net Security 60% of enterprise SaaS and AI applications operate outside IT’s visibility, according to CloudEagle.ai. This surge in invisible IT is fueling a crisis in AI identity governance, leading to increased breaches, audit failures, and compliance risk across enterprises. A

React to this headline:

Loading spinner

Most AI and SaaS apps are outside IT’s control Read More »

Quantum risk is already changing cybersecurity

Quantum risk is already changing cybersecurity 2025-06-23 at 08:18 By Mirko Zorz A new report from the Cyber Threat Alliance warns that the era of quantum risk is already underway, and security teams need to stop treating it like a problem for tomorrow. The report, Approaching Quantum Dawn: Closing the Cybersecurity Readiness Gap Before It’s

React to this headline:

Loading spinner

Quantum risk is already changing cybersecurity Read More »

Thieves don’t need your car keys, just a wireless signal

Thieves don’t need your car keys, just a wireless signal 2025-06-19 at 08:01 By Sinisa Markovic A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote Keyless Entry (RKE) systems, the auto industry has made little progress in strengthening security. Since RKE’s introduction in the

React to this headline:

Loading spinner

Thieves don’t need your car keys, just a wireless signal Read More »

CISOs need better tools to turn risk into action

CISOs need better tools to turn risk into action 2025-06-04 at 07:01 By Help Net Security Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to a new Ivanti report. The “Exposure Management: From Subjective to Objective Cybersecurity” report points out that as companies keep

React to this headline:

Loading spinner

CISOs need better tools to turn risk into action Read More »

AI agents have access to key data across the enterprise

AI agents have access to key data across the enterprise 2025-05-30 at 08:14 By Help Net Security 82% of organizations already use AI agents, but only 44% of organizations report having policies in place to secure them, according to SailPoint. While 53% are in the process of developing such policies, the reality is that most

React to this headline:

Loading spinner

AI agents have access to key data across the enterprise Read More »

Why layoffs increase cybersecurity risks

Why layoffs increase cybersecurity risks 2025-05-26 at 08:32 By Sinisa Markovic A wave of layoffs has swept through the tech industry, leaving IT teams in a rush to revoke all access those employees may have had. Additionally, 54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and

React to this headline:

Loading spinner

Why layoffs increase cybersecurity risks Read More »

Many rush into GenAI deployments, frequently without a security net

Many rush into GenAI deployments, frequently without a security net 2025-05-22 at 08:03 By Help Net Security 70% percent of organizations view the pace of AI development, particularly in GenAI, as the leading security concern related to its adoption, followed by lack of data integrity (64%) and trustworthiness (57%), according to Thales. GenAI becomes a

React to this headline:

Loading spinner

Many rush into GenAI deployments, frequently without a security net Read More »

Be careful what you share with GenAI tools at work

Be careful what you share with GenAI tools at work 2025-05-22 at 07:04 By Sinisa Markovic We use GenAI at work to make tasks easier, but are we aware of the risks? According to Netskope, the average organization now shares more than 7.7GB of data with AI tools per month, and 75% of enterprise users

React to this headline:

Loading spinner

Be careful what you share with GenAI tools at work Read More »

Insider risk management needs a human strategy

Insider risk management needs a human strategy 2025-05-14 at 08:01 By Mirko Zorz Insider risk is not just about bad actors. Most of the time, it’s about mistakes. Someone sends a sensitive file to the wrong address, or uploads a document to their personal cloud to work from home. In many cases, there is no

React to this headline:

Loading spinner

Insider risk management needs a human strategy Read More »

Layoffs pose a cybersecurity risk: Here’s why offboarding matters

Layoffs pose a cybersecurity risk: Here’s why offboarding matters 2025-05-12 at 07:39 By Help Net Security In this Help Net Security video, Chase Doelling, Principal Strategist at JumpCloud, discusses the overlooked security risks associated with improper offboarding. Though many organizations focus on securely onboarding new employees, they often overlook the security risks associated with properly

React to this headline:

Loading spinner

Layoffs pose a cybersecurity risk: Here’s why offboarding matters Read More »

Even the best safeguards can’t stop LLMs from being fooled

Even the best safeguards can’t stop LLMs from being fooled 2025-05-08 at 08:48 By Mirko Zorz In this Help Net Security interview, Michael Pound, Associate Professor at the University of Nottingham shares his insights on the cybersecurity risks associated with LLMs. He discusses common organizational mistakes and the necessary precautions for securing sensitive data when

React to this headline:

Loading spinner

Even the best safeguards can’t stop LLMs from being fooled Read More »

How CISOs can talk cybersecurity so it makes sense to executives

How CISOs can talk cybersecurity so it makes sense to executives 2025-05-05 at 09:02 By Mirko Zorz CISOs know cyber risk is business risk. Boards don’t always see it that way.​ For years, CISOs have struggled to get boards to understand security beyond buzzwords. Many feel they’re either ignored or misunderstood. But with threats growing

React to this headline:

Loading spinner

How CISOs can talk cybersecurity so it makes sense to executives Read More »

People know password reuse is risky but keep doing it anyway

People know password reuse is risky but keep doing it anyway 2025-05-02 at 08:16 By Help Net Security 35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of

React to this headline:

Loading spinner

People know password reuse is risky but keep doing it anyway Read More »

Most critical vulnerabilities aren’t worth your attention

Most critical vulnerabilities aren’t worth your attention 2025-04-28 at 07:03 By Help Net Security Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still contain at least one vulnerability By analyzing

React to this headline:

Loading spinner

Most critical vulnerabilities aren’t worth your attention Read More »

Cyber threats now a daily reality for one in three businesses

Cyber threats now a daily reality for one in three businesses 2025-04-21 at 07:40 By Help Net Security Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory hurdles and operational inefficiencies, according to research from FIS and Oxford Economics. The cost of disharmony is

React to this headline:

Loading spinner

Cyber threats now a daily reality for one in three businesses Read More »

Scroll to Top