cybersecurity

Researchers develop AI system to detect scam websites in search results

Researchers develop AI system to detect scam websites in search results 2025-10-09 at 13:07 By Sinisa Markovic Scam websites tied to online shopping, pet sales, and other e-commerce schemes continue to cause millions in losses each year. Security tools can accurately detect fraudulent sites once they are found, but identifying new ones remains difficult. To […]

React to this headline:

Loading spinner

Researchers develop AI system to detect scam websites in search results Read More »

Behind the screens: Building security customers appreciate

Behind the screens: Building security customers appreciate 2025-10-09 at 08:03 By Mirko Zorz In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer trust. Vachon explains how PRA Group balances identity verification with a seamless customer experience. Vachon also reflects

React to this headline:

Loading spinner

Behind the screens: Building security customers appreciate Read More »

Six metrics policymakers need to track cyber resilience

Six metrics policymakers need to track cyber resilience 2025-10-09 at 07:48 By Anamarija Pogorelec Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a forward-looking picture of resilience. A new report from Zurich Insurance Group argues

React to this headline:

Loading spinner

Six metrics policymakers need to track cyber resilience Read More »

Turning the human factor into your strongest cybersecurity defense

Turning the human factor into your strongest cybersecurity defense 2025-10-09 at 07:30 By Help Net Security In this Help Net Security video, Jacob Martens, Field CISO at Upwind Security, explores one of cybersecurity’s most enduring challenges: the human factor behind breaches. Despite advances in technology, most attacks still begin with people, not code. He explains

React to this headline:

Loading spinner

Turning the human factor into your strongest cybersecurity defense Read More »

Rethinking AI security architectures beyond Earth

Rethinking AI security architectures beyond Earth 2025-10-08 at 09:39 By Mirko Zorz If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while communicating through long, delay-prone links. A new study explores how AI could automate security

React to this headline:

Loading spinner

Rethinking AI security architectures beyond Earth Read More »

Developing economies are falling behind in the fight against cybercrime

Developing economies are falling behind in the fight against cybercrime 2025-10-08 at 08:04 By Sinisa Markovic Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to have when budgets allow. That means little investment in tools,

React to this headline:

Loading spinner

Developing economies are falling behind in the fight against cybercrime Read More »

New system aims to keep people connected when networks fail

New system aims to keep people connected when networks fail 2025-10-08 at 07:32 By Sinisa Markovic When disaster strikes, communication often fails. Cell towers can go offline, internet connections can disappear, and people are left without a way to share information or ask for help. A new research project looks at how to keep people

React to this headline:

Loading spinner

New system aims to keep people connected when networks fail Read More »

How to get better results from bug bounty programs without wasting money

How to get better results from bug bounty programs without wasting money 2025-10-07 at 14:03 By Mirko Zorz The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that would otherwise slip through. A new academic study based on Google’s Vulnerability Rewards Program (VRP) offers rare

React to this headline:

Loading spinner

How to get better results from bug bounty programs without wasting money Read More »

The architecture of lies: Bot farms are running the disinformation war

The architecture of lies: Bot farms are running the disinformation war 2025-10-07 at 14:03 By Sinisa Markovic Bot farms have moved into the center of information warfare, using automated accounts to manipulate public opinion, influence elections, and weaken trust in institutions. Algorithms reward noise over truth Thales reports that in 2024, automated bot traffic made

React to this headline:

Loading spinner

The architecture of lies: Bot farms are running the disinformation war Read More »

Cybersecurity’s next test: AI, quantum, and geopolitics

Cybersecurity’s next test: AI, quantum, and geopolitics 2025-10-07 at 14:03 By Anamarija Pogorelec Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and uneven preparation for the next wave of threats. Geopolitical risk at the core

React to this headline:

Loading spinner

Cybersecurity’s next test: AI, quantum, and geopolitics Read More »

How to succeed at cybersecurity job interviews

How to succeed at cybersecurity job interviews 2025-10-06 at 09:06 By Sinisa Markovic Imagine this: you’ve made it through the résumé screen, your skills look solid on paper, and now it’s interview day. The next hour will decide whether you move forward or go back to the job boards. What separates the candidates who land

React to this headline:

Loading spinner

How to succeed at cybersecurity job interviews Read More »

Meet ARGUS, the robot built to catch hackers and physical intruders

Meet ARGUS, the robot built to catch hackers and physical intruders 2025-10-06 at 08:38 By Sinisa Markovic Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and together those actions create a bigger risk than either one alone. Most

React to this headline:

Loading spinner

Meet ARGUS, the robot built to catch hackers and physical intruders Read More »

Old authentication habits die hard

Old authentication habits die hard 2025-10-06 at 07:48 By Anamarija Pogorelec Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and policy gaps 40% of employees said they have never received cybersecurity training. Even among those who have, the guidance is often outdated because many

React to this headline:

Loading spinner

Old authentication habits die hard Read More »

Phishing is old, but AI just gave it new life

Phishing is old, but AI just gave it new life 2025-10-06 at 07:03 By Anamarija Pogorelec The volume of cyberattacks has reached staggering levels, with new tactics that blur the line between legitimate and malicious activity. A new threat report from Comcast, based on 34.6 billion cybersecurity events analyzed over the past year, shows what

React to this headline:

Loading spinner

Phishing is old, but AI just gave it new life Read More »

When loading a model means loading an attacker

When loading a model means loading an attacker 2025-10-03 at 10:15 By Sinisa Markovic You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads and loads a machine learning model? A recent study shows why you

React to this headline:

Loading spinner

When loading a model means loading an attacker Read More »

4 ways to use time to level up your security monitoring

4 ways to use time to level up your security monitoring 2025-10-03 at 09:09 By Help Net Security SIEMs excel at correlating events and firing alerts, but their ingest pipelines can get overwhelmed when scaled. And because most SIEMs rely on general-purpose log storage platforms, even with lower-cost archive tiers, long-term retention at full fidelity

React to this headline:

Loading spinner

4 ways to use time to level up your security monitoring Read More »

Passkeys rise, but scams still hit hard in 2025

Passkeys rise, but scams still hit hard in 2025 2025-10-03 at 08:34 By Anamarija Pogorelec Americans are dealing with a growing wave of digital scams, and many are losing money in the process. According to the fourth annual Consumer Cyber Readiness Report, nearly half of U.S. adults have been targeted by cyberattacks or scams, and

React to this headline:

Loading spinner

Passkeys rise, but scams still hit hard in 2025 Read More »

Apple strengthens storage flexibility with new disk image formats

Apple strengthens storage flexibility with new disk image formats 2025-10-03 at 08:04 By Sinisa Markovic Apple’s release of macOS 26 Tahoe introduced a new disk image format and updated an older one, both of which are drawing attention from system testers and forensic examiners. Apple Sparse Image Format (ASIF) The Apple Sparse Image Format (ASIF)

React to this headline:

Loading spinner

Apple strengthens storage flexibility with new disk image formats Read More »

Building a mature automotive cybersecurity program beyond checklists

Building a mature automotive cybersecurity program beyond checklists 2025-10-02 at 09:41 By Mirko Zorz In this Help Net Security interview, Robert Sullivan, CIO & CISO at Agero, shares his perspective on automotive cybersecurity. He discusses strategies for developing mature security programs, meeting regulatory requirements, and addressing supply chain risks. Sullivan also looks ahead to how

React to this headline:

Loading spinner

Building a mature automotive cybersecurity program beyond checklists Read More »

GPT needs to be rewired for security

GPT needs to be rewired for security 2025-10-02 at 09:18 By Help Net Security LLMs and agentic systems already shine at everyday productivity, including transcribing and summarizing meetings, extracting action items, prioritizing critical emails, and even planning travel. But in the SOC (where mistakes have real cost), today’s models stumble on work that demands high

React to this headline:

Loading spinner

GPT needs to be rewired for security Read More »

Scroll to Top