cybersecurity

A new approach to blockchain spam: Local reputation over global rules

A new approach to blockchain spam: Local reputation over global rules 2025-10-17 at 10:18 By Mirko Zorz Spam has long been a nuisance in blockchain networks, clogging transaction queues and driving up fees. A new research paper from Delft University of Technology introduces a decentralized solution called STARVESPAM that could help nodes in permissionless blockchains […]

React to this headline:

Loading spinner

A new approach to blockchain spam: Local reputation over global rules Read More »

Inside healthcare’s quiet cybersecurity breakdown

Inside healthcare’s quiet cybersecurity breakdown 2025-10-17 at 08:52 By Anamarija Pogorelec Hospitals, clinics, and care networks continue to treat cybersecurity as a back-office issue, according to the 2025 Healthcare IT Landscape Report from Omega Systems. Security takes a back seat Healthcare IT leaders are juggling competing demands. Rising costs, new privacy regulations, and expanding digital

React to this headline:

Loading spinner

Inside healthcare’s quiet cybersecurity breakdown Read More »

Everyone’s adopting AI, few are managing the risk

Everyone’s adopting AI, few are managing the risk 2025-10-17 at 08:52 By Anamarija Pogorelec AI is spreading across enterprise risk functions, but confidence in those systems remains uneven, according to AuditBoard. More than half of organizations report implementing AI-specific tools, and many are training teams in machine learning skills. Yet, few feel prepared for the

React to this headline:

Loading spinner

Everyone’s adopting AI, few are managing the risk Read More »

When trusted AI connections turn hostile

When trusted AI connections turn hostile 2025-10-16 at 09:02 By Mirko Zorz Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers can quietly take control of hosts, manipulate LLM behavior, and deceive users, all while staying undetected by

React to this headline:

Loading spinner

When trusted AI connections turn hostile Read More »

Identifying risky candidates: Practical steps for security leaders

Identifying risky candidates: Practical steps for security leaders 2025-10-16 at 08:32 By Help Net Security Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can turn into costly problems down the line. Identity verification, credential validation,

React to this headline:

Loading spinner

Identifying risky candidates: Practical steps for security leaders Read More »

Everyone wants AI, but few are ready to defend it

Everyone wants AI, but few are ready to defend it 2025-10-16 at 08:05 By Anamarija Pogorelec The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI, many are not ready for the pressure it puts on

React to this headline:

Loading spinner

Everyone wants AI, but few are ready to defend it Read More »

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China 2025-10-16 at 07:33 By Sinisa Markovic Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that can be hacked through Bluetooth Their tests show

React to this headline:

Loading spinner

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China Read More »

The password problem we keep pretending to fix

The password problem we keep pretending to fix 2025-10-16 at 07:15 By Anamarija Pogorelec Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had faced at least one identity-related breach in recent years, and most of

React to this headline:

Loading spinner

The password problem we keep pretending to fix Read More »

Building trust in AI-powered security operations

Building trust in AI-powered security operations 2025-10-15 at 08:22 By Help Net Security In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability to process vast amounts of data and detect anomalies faster than humans is

React to this headline:

Loading spinner

Building trust in AI-powered security operations Read More »

The diagnosis is in: Mobile health apps are bad for your privacy

The diagnosis is in: Mobile health apps are bad for your privacy 2025-10-15 at 07:40 By Sinisa Markovic Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components. Study design showing data collection, static security analysis

React to this headline:

Loading spinner

The diagnosis is in: Mobile health apps are bad for your privacy Read More »

The power grid is getting old, and so is the cybersecurity protecting it

The power grid is getting old, and so is the cybersecurity protecting it 2025-10-15 at 07:03 By Anamarija Pogorelec Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, water, and transport are reaching the end

React to this headline:

Loading spinner

The power grid is getting old, and so is the cybersecurity protecting it Read More »

The solar power boom opened a backdoor for cybercriminals

The solar power boom opened a backdoor for cybercriminals 2025-10-14 at 11:49 By Sinisa Markovic Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in the transition. Cyber threats expose weak spots in solar power systems Until recently, security risks in

React to this headline:

Loading spinner

The solar power boom opened a backdoor for cybercriminals Read More »

Security validation: The key to maximizing ROI from security investments

Security validation: The key to maximizing ROI from security investments 2025-10-14 at 08:00 By Help Net Security Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern enterprise’s cyber defenses. Yet despite these significant investments, attackers continue to exploit misconfigurations, untested rules, and hidden dependencies

React to this headline:

Loading spinner

Security validation: The key to maximizing ROI from security investments Read More »

Building a healthcare cybersecurity strategy that works

Building a healthcare cybersecurity strategy that works 2025-10-13 at 09:41 By Mirko Zorz In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He explains how focusing on areas like vulnerability management and network segmentation can make the biggest difference. Cummings

React to this headline:

Loading spinner

Building a healthcare cybersecurity strategy that works Read More »

AI-generated images have a problem of credibility, not creativity

AI-generated images have a problem of credibility, not creativity 2025-10-13 at 08:34 By Sinisa Markovic GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada examined watermarking as a way to tag AI images so origin and integrity can be checked. Watermarking scenario overview

React to this headline:

Loading spinner

AI-generated images have a problem of credibility, not creativity Read More »

The five-minute guide to OT cyber resilience

The five-minute guide to OT cyber resilience 2025-10-13 at 08:19 By Help Net Security In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote access points, supply chain connections, and the need for specialized sensors to monitor OT networks that

React to this headline:

Loading spinner

The five-minute guide to OT cyber resilience Read More »

When hackers hit, patient safety takes the fall

When hackers hit, patient safety takes the fall 2025-10-13 at 07:33 By Anamarija Pogorelec 93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The study found that most of these attacks involved cloud account compromises, ransomware, supply chain intrusions,

React to this headline:

Loading spinner

When hackers hit, patient safety takes the fall Read More »

Attackers don’t linger, they strike and move on

Attackers don’t linger, they strike and move on 2025-10-13 at 07:26 By Anamarija Pogorelec Cyber attacks are happening faster than ever. Intrusions that once took weeks or months now unfold in minutes, leaving little time to react. Attackers move quickly once they gain access, aiming to run their payloads and get results before defenders can

React to this headline:

Loading spinner

Attackers don’t linger, they strike and move on Read More »

From theory to training: Lessons in making NICE usable

From theory to training: Lessons in making NICE usable 2025-10-10 at 09:02 By Mirko Zorz SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from Cleveland State University looked at how these companies could train staff without getting lost in the thousands of skills and

React to this headline:

Loading spinner

From theory to training: Lessons in making NICE usable Read More »

Securing agentic AI with intent-based permissions

Securing agentic AI with intent-based permissions 2025-10-10 at 08:31 By Help Net Security When seatbelts were first introduced, cars were relatively slow and a seatbelt was enough to keep drivers safe in most accidents. But as vehicles became more powerful, automakers had to add airbags, crumple zones, and (eventually) adaptive driver assistance systems that anticipate

React to this headline:

Loading spinner

Securing agentic AI with intent-based permissions Read More »

Scroll to Top