cybercriminals

As biohacking evolves, how vulnerable are we to cyber threats?

As biohacking evolves, how vulnerable are we to cyber threats? 12/10/2023 at 07:01 By Help Net Security Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to Entelgy. However, despite more than a decade […]

React to this headline:

Loading spinner

As biohacking evolves, how vulnerable are we to cyber threats? Read More »

Cybercriminals can go from click to compromise in less than a day

Cybercriminals can go from click to compromise in less than a day 10/10/2023 at 06:02 By Help Net Security The median dwell time in ransomware engagements dropped to just under 24 hours from 4.5 days in the previous year and 5.5 days in the year before that, according to SecureWorks. In 10% of cases, ransomware

React to this headline:

Loading spinner

Cybercriminals can go from click to compromise in less than a day Read More »

LLMs lower the barrier for entry into cybercrime

LLMs lower the barrier for entry into cybercrime 05/10/2023 at 07:31 By Help Net Security Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt chatbots or large language models (LLM) lower the barrier for entry to cybercrime, making it possible to create well-written

React to this headline:

Loading spinner

LLMs lower the barrier for entry into cybercrime Read More »

Cybersecurity preparedness pays big dividends for businesses

Cybersecurity preparedness pays big dividends for businesses 04/10/2023 at 06:32 By Help Net Security Businesses are taking cybersecurity more seriously by boosting resources and preparedness, according to GetApp. US businesses on the whole are gaining ground against cybercriminals after several years of increasingly severe threats, but the Las Vegas cyberattacks are a stark reminder of

React to this headline:

Loading spinner

Cybersecurity preparedness pays big dividends for businesses Read More »

Protecting against FraudGPT, ChatGPT’s evil twin

Protecting against FraudGPT, ChatGPT’s evil twin 02/10/2023 at 07:01 By Help Net Security FraudGPT is the evil counterpart to ChatGPT. Criminals use it to target businesses with phishing emails and scams with speed and accuracy like never before. The AI can be prompted to create the most realistic phishing emails, perfected down to a business’

React to this headline:

Loading spinner

Protecting against FraudGPT, ChatGPT’s evil twin Read More »

Global events fuel DDoS attack campaigns

Global events fuel DDoS attack campaigns 02/10/2023 at 06:32 By Help Net Security Cybercriminals launched approximately 7.9 million DDoS attacks in 1H 2023, representing a 31% year-over-year increase, according to NETSCOUT. Global events like the Russia-Ukraine war and NATO bids have driven recent DDoS attack growth. Finland was targeted by pro-Russian hacktivists in 2022 during

React to this headline:

Loading spinner

Global events fuel DDoS attack campaigns Read More »

How should organizations navigate the risks and opportunities of AI?

How should organizations navigate the risks and opportunities of AI? 29/09/2023 at 08:33 By Help Net Security As we realize exciting new advancements in the application of generative pre-trained transformer (GPT) technology, our adversaries are finding ingenious ways to leverage these capabilities to inflict harm. There’s evidence to suggest that offensive actors are using AI

React to this headline:

Loading spinner

How should organizations navigate the risks and opportunities of AI? Read More »

Why California’s Delete Act matters for the whole country

Why California’s Delete Act matters for the whole country 29/09/2023 at 06:32 By Help Net Security The California State Legislature passed Senate Bill 362, known as the Delete Act, to simplify the process for consumers to ask to remove their personal data gathered by data brokers. In this Help Net Security video, Dr. Chris Pierson,

React to this headline:

Loading spinner

Why California’s Delete Act matters for the whole country Read More »

Ransomware groups are shifting their focus away from larger targets

Ransomware groups are shifting their focus away from larger targets 28/09/2023 at 06:02 By Help Net Security One in every six ransomware attacks targeting US government offices was traced back to the LockBit ransomware group, according to Trend Micro. Overall ransomware attack victim numbers increased by 47% from H2 2022. “We’ve observed a significant increase

React to this headline:

Loading spinner

Ransomware groups are shifting their focus away from larger targets Read More »

High number of security flaws found in EMEA-developed apps

High number of security flaws found in EMEA-developed apps 27/09/2023 at 07:47 By Help Net Security Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to Veracode. Across all regions analysed, EMEA also has the highest percentage of ‘high severity’

React to this headline:

Loading spinner

High number of security flaws found in EMEA-developed apps Read More »

Balancing cybersecurity with convenience and progress

Balancing cybersecurity with convenience and progress 25/09/2023 at 07:02 By Help Net Security Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity decision makers and practitioners, according to CompTIA. The state of cybersecurity Most business and technology professionals feel that

React to this headline:

Loading spinner

Balancing cybersecurity with convenience and progress Read More »

Enterprises persist with outdated authentication strategies

Enterprises persist with outdated authentication strategies 15/09/2023 at 07:33 By Help Net Security Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are struggling to deliver secure and user-friendly authentication. The research uncovered

React to this headline:

Loading spinner

Enterprises persist with outdated authentication strategies Read More »

Latest fraud schemes targeting the payments ecosystem

Latest fraud schemes targeting the payments ecosystem 13/09/2023 at 06:33 By Help Net Security Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include the use of malvertising and search engine optimization (SEO) techniques to cultivate compelling and effective phishing and social engineering campaigns, the

React to this headline:

Loading spinner

Latest fraud schemes targeting the payments ecosystem Read More »

How cybercriminals use look-alike domains to impersonate brands

How cybercriminals use look-alike domains to impersonate brands 07/09/2023 at 07:32 By Help Net Security Cybercriminals create hundreds of thousands of counterfeit domains that mimic well-known brands for financial gain. These fake domains serve multiple malicious purposes, such as sending phishing emails, hosting fraudulent websites, rerouting web traffic, and distributing malware. In this Help Net

React to this headline:

Loading spinner

How cybercriminals use look-alike domains to impersonate brands Read More »

Connected cars and cybercrime: A primer

Connected cars and cybercrime: A primer 05/09/2023 at 08:02 By Help Net Security Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow pedal investment in addressing cyberthreats. To date, the attacks that they have encountered have remained relatively unsophisticated and not especially harmful. Analysis

React to this headline:

Loading spinner

Connected cars and cybercrime: A primer Read More »

Spam is up, QR codes emerge as a significant threat vector

Spam is up, QR codes emerge as a significant threat vector 04/09/2023 at 07:31 By Help Net Security 85% of phishing emails utilized malicious links in the content of the email, and spam emails increased by 30% from Q1 to Q2 2023, according to a VIPRE report. Information technology organizations also overtook financial institutions (9%)

React to this headline:

Loading spinner

Spam is up, QR codes emerge as a significant threat vector Read More »

Cybercriminals use research contests to create new attack methods

Cybercriminals use research contests to create new attack methods 01/09/2023 at 07:17 By Help Net Security Adversary-sponsored research contests on cybercriminal forums focus on new methods of attack and evasion, according to Sophos. The contests mirror legitimate security conference ‘Call For Papers’ and provide the winners considerable financial rewards and recognition from peers and also

React to this headline:

Loading spinner

Cybercriminals use research contests to create new attack methods Read More »

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store 31/08/2023 at 12:18 By Help Net Security ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF. Most likely active since July 2020 and since

React to this headline:

Loading spinner

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store Read More »

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals turn to AI to bypass modern email security measures 23/08/2023 at 06:31 By Help Net Security Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterman Research. AI’s role

React to this headline:

Loading spinner

Cybercriminals turn to AI to bypass modern email security measures Read More »

How executives’ personal devices threaten business security

How executives’ personal devices threaten business security 11/08/2023 at 06:02 By Help Net Security Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to Agency. Yet, while the cyber threat landscape has seen this major shift, security software to

React to this headline:

Loading spinner

How executives’ personal devices threaten business security Read More »

Scroll to Top