cybersecurity

What your browser knows about you, from contacts to card numbers

What your browser knows about you, from contacts to card numbers 2025-05-09 at 13:06 By Anamarija Pogorelec Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data. Chrome: the most data-hungry browser (Source: Surfshark) The most data-hungry browsers […]

React to this headline:

Loading spinner

What your browser knows about you, from contacts to card numbers Read More »

May 2025 Patch Tuesday forecast: Panic, change, and hope

May 2025 Patch Tuesday forecast: Panic, change, and hope 2025-05-09 at 09:11 By Help Net Security April was an event-filled month for cybersecurity. Patch Tuesday came to us quickly on April 8 – the earliest first Tuesday possible in a given month. We again saw large numbers of CVEs addressed with 84 in Windows 11

React to this headline:

Loading spinner

May 2025 Patch Tuesday forecast: Panic, change, and hope Read More »

How agentic AI and non-human identities are transforming cybersecurity

How agentic AI and non-human identities are transforming cybersecurity 2025-05-08 at 09:03 By Help Net Security Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the fragmentation of human identity management resulting from authorizing a single person’s access to multiple on-premises, cloud

React to this headline:

Loading spinner

How agentic AI and non-human identities are transforming cybersecurity Read More »

Even the best safeguards can’t stop LLMs from being fooled

Even the best safeguards can’t stop LLMs from being fooled 2025-05-08 at 08:48 By Mirko Zorz In this Help Net Security interview, Michael Pound, Associate Professor at the University of Nottingham shares his insights on the cybersecurity risks associated with LLMs. He discusses common organizational mistakes and the necessary precautions for securing sensitive data when

React to this headline:

Loading spinner

Even the best safeguards can’t stop LLMs from being fooled Read More »

Wave of tech layoffs leads to more job scams

Wave of tech layoffs leads to more job scams 2025-05-08 at 08:06 By Sinisa Markovic The tech industry is experiencing significant layoffs, leaving thousands of IT and cybersecurity professionals in search of new employment opportunities. Unfortunately, as these individuals search for new opportunities, scammers are actively preying on them. Losing a job, especially when you

React to this headline:

Loading spinner

Wave of tech layoffs leads to more job scams Read More »

Global cybersecurity readiness remains critically low

Global cybersecurity readiness remains critically low 2025-05-08 at 07:34 By Help Net Security Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 Cybersecurity Readiness Index. This is a slight increase from last year’s index, in which 3% of organizations worldwide were designated as

React to this headline:

Loading spinner

Global cybersecurity readiness remains critically low Read More »

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts 2025-05-08 at 07:02 By Help Net Security Healthcare organizations are facing a growing data security challenge from within, according to a new report from Netskope Threat Labs. The analysis reveals that employees in the sector are frequently attempting to upload sensitive information, including potentially protected

React to this headline:

Loading spinner

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts Read More »

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules 2025-05-07 at 08:32 By Mirko Zorz Application security is changing fast. In this Help Net Security interview, Loris Gutic, Global CISO at Bright, talks about what it takes to keep up. Gutic explains how DevOps, containers, and serverless tools are shaping security, and shares

React to this headline:

Loading spinner

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules Read More »

What a future without CVEs means for cyber defense

What a future without CVEs means for cyber defense 2025-05-06 at 11:31 By Help Net Security The importance of the MITRE-run Common Vulnerabilities and Exposures (CVE) Program shouldn’t be understated. For 25 years, it has acted as the point of reference for cybersecurity professionals to understand and mitigate security flaws. By providing a standardized method

React to this headline:

Loading spinner

What a future without CVEs means for cyber defense Read More »

What it really takes to build a resilient cyber program

What it really takes to build a resilient cyber program 2025-05-06 at 08:32 By Mirko Zorz In this Help Net Security interview, Dylan Owen, CISO at Nightwing, talks about what it really takes to build an effective defense: choosing the right frameworks, setting up processes, and getting everyone on the same page. Drawing on both

React to this headline:

Loading spinner

What it really takes to build a resilient cyber program Read More »

How cybercriminals exploit psychological triggers in social engineering attacks

How cybercriminals exploit psychological triggers in social engineering attacks 2025-05-06 at 08:03 By Sinisa Markovic Most attacks don’t start with malware; they begin with a message that seems completely normal, whether it comes through email, a phone call, or a chat, and that is exactly what makes them so effective. These threats rely on psychological

React to this headline:

Loading spinner

How cybercriminals exploit psychological triggers in social engineering attacks Read More »

How CISOs can talk cybersecurity so it makes sense to executives

How CISOs can talk cybersecurity so it makes sense to executives 2025-05-05 at 09:02 By Mirko Zorz CISOs know cyber risk is business risk. Boards don’t always see it that way.​ For years, CISOs have struggled to get boards to understand security beyond buzzwords. Many feel they’re either ignored or misunderstood. But with threats growing

React to this headline:

Loading spinner

How CISOs can talk cybersecurity so it makes sense to executives Read More »

How OSINT supports financial crime investigations

How OSINT supports financial crime investigations 2025-05-05 at 08:31 By Mirko Zorz In this Help Net Security interview, Stuart Clarke, CEO at Blackdot Solutions, discusses the strategic use of open-source intelligence (OSINT) in tackling financial crime. He outlines its application in areas such as fraud, sanctions evasion, and money laundering, and addresses the legal, ethical,

React to this headline:

Loading spinner

How OSINT supports financial crime investigations Read More »

Ransomware spike exposes cracks in cloud security

Ransomware spike exposes cracks in cloud security 2025-05-05 at 07:01 By Help Net Security 90% of IT and security leaders said their organization experienced a cyberattack within the last year, according to a report by Rubrik. “Many organizations that move to the cloud assume their providers will handle security,” said Joe Hladik, Head of Rubrik

React to this headline:

Loading spinner

Ransomware spike exposes cracks in cloud security Read More »

AI and automation shift the cybersecurity balance toward attackers

AI and automation shift the cybersecurity balance toward attackers 2025-05-02 at 09:02 By Help Net Security Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security.

React to this headline:

Loading spinner

AI and automation shift the cybersecurity balance toward attackers Read More »

Phone theft is turning into a serious cybersecurity risk

Phone theft is turning into a serious cybersecurity risk 2025-05-02 at 08:35 By Sinisa Markovic Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat. In the UK alone, the Metropolitan Police recovers 1,000 phones each week. Stolen phones don’t just go to local black

React to this headline:

Loading spinner

Phone theft is turning into a serious cybersecurity risk Read More »

People know password reuse is risky but keep doing it anyway

People know password reuse is risky but keep doing it anyway 2025-05-02 at 08:16 By Help Net Security 35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of

React to this headline:

Loading spinner

People know password reuse is risky but keep doing it anyway Read More »

Why SMEs can no longer afford to ignore cyber risk

Why SMEs can no longer afford to ignore cyber risk 2025-05-01 at 09:32 By Mirko Zorz In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small and medium-sized businesses (SMEs) must reassess their risk exposure and prioritize resilience to safeguard their long-term growth and stability.

React to this headline:

Loading spinner

Why SMEs can no longer afford to ignore cyber risk Read More »

Preparing for the next wave of machine identity growth

Preparing for the next wave of machine identity growth 2025-05-01 at 09:21 By Mirko Zorz Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how automation can help, and

React to this headline:

Loading spinner

Preparing for the next wave of machine identity growth Read More »

Hottest cybersecurity open-source tools of the month: April 2025

Hottest cybersecurity open-source tools of the month: April 2025 2025-05-01 at 08:36 By Help Net Security This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source OSINT tool for uncovering digital footprints GoSearch is an open-source OSINT tool built to uncover digital footprints linked to

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: April 2025 Read More »

Scroll to Top