cybersecurity

What could a secure 6G network look like?

What could a secure 6G network look like? 2025-09-15 at 08:47 By Help Net Security The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised […]

React to this headline:

Loading spinner

What could a secure 6G network look like? Read More »

Why neglected assets are the hidden threat attackers love to find

Why neglected assets are the hidden threat attackers love to find 2025-09-15 at 07:58 By Help Net Security In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned storage,

React to this headline:

Loading spinner

Why neglected assets are the hidden threat attackers love to find Read More »

Static feeds leave intelligence teams reacting to irrelevant or late data

Static feeds leave intelligence teams reacting to irrelevant or late data 2025-09-15 at 07:12 By Anamarija Pogorelec Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues

React to this headline:

Loading spinner

Static feeds leave intelligence teams reacting to irrelevant or late data Read More »

CISOs brace for a new kind of AI chaos

CISOs brace for a new kind of AI chaos 2025-09-12 at 08:47 By Anamarija Pogorelec AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are already exploiting, according to the SANS Institute. The scale of the problem Attackers are using AI to work at speeds

React to this headline:

Loading spinner

CISOs brace for a new kind of AI chaos Read More »

Attackers are coming for drug formulas and patient data

Attackers are coming for drug formulas and patient data 2025-09-12 at 08:18 By Sinisa Markovic In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value assets make the sector a constant focus for attacks. Disruptions to research or medicine distribution can have life-threatening consequences. “During

React to this headline:

Loading spinner

Attackers are coming for drug formulas and patient data Read More »

How attackers weaponize communications networks

How attackers weaponize communications networks 2025-09-11 at 08:30 By Mirko Zorz In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations range from corporate espionage to geopolitical influence. The discussion

React to this headline:

Loading spinner

How attackers weaponize communications networks Read More »

The state of DMARC adoption: What 10M domains reveal

The state of DMARC adoption: What 10M domains reveal 2025-09-11 at 07:43 By Help Net Security In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email

React to this headline:

Loading spinner

The state of DMARC adoption: What 10M domains reveal Read More »

Automated network pentesting uncovers what traditional tests missed

Automated network pentesting uncovers what traditional tests missed 2025-09-10 at 11:45 By Zeljka Zorz Most organizations run an annual network penetration test, remediate the issues it uncovers, and move on. But attackers are probing networks every day, using publicly available tools to exploit common misconfigurations and overlooked vulnerabilities. A new report, based on over 50,000

React to this headline:

Loading spinner

Automated network pentesting uncovers what traditional tests missed Read More »

Deepfakes are rewriting the rules of geopolitics

Deepfakes are rewriting the rules of geopolitics 2025-09-10 at 09:21 By Sinisa Markovic Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate across the

React to this headline:

Loading spinner

Deepfakes are rewriting the rules of geopolitics Read More »

CISOs, stop chasing vulnerabilities and start managing human risk

CISOs, stop chasing vulnerabilities and start managing human risk 2025-09-10 at 07:25 By Anamarija Pogorelec Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than technical flaws. The survey

React to this headline:

Loading spinner

CISOs, stop chasing vulnerabilities and start managing human risk Read More »

Attackers test the limits of railway cybersecurity

Attackers test the limits of railway cybersecurity 2025-09-09 at 08:31 By Sinisa Markovic Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, the railway industry is undergoing its digital transformation.

React to this headline:

Loading spinner

Attackers test the limits of railway cybersecurity Read More »

Employees keep feeding AI tools secrets they can’t take back

Employees keep feeding AI tools secrets they can’t take back 2025-09-09 at 08:03 By Anamarija Pogorelec Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are missing basic safeguards to manage this data. Security control maturity

React to this headline:

Loading spinner

Employees keep feeding AI tools secrets they can’t take back Read More »

Are we headed for an AI culture war?

Are we headed for an AI culture war? 2025-09-09 at 07:52 By Help Net Security In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and

React to this headline:

Loading spinner

Are we headed for an AI culture war? Read More »

Cybersecurity research is getting new ethics rules, here’s what you need to know

Cybersecurity research is getting new ethics rules, here’s what you need to know 2025-09-08 at 09:01 By Mirko Zorz Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, all submissions must include a stakeholder-based ethics analysis. Other major venues such

React to this headline:

Loading spinner

Cybersecurity research is getting new ethics rules, here’s what you need to know Read More »

InterceptSuite: Open-source network traffic interception tool

InterceptSuite: Open-source network traffic interception tool 2025-09-08 at 08:34 By Mirko Zorz InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP, and custom protocols,

React to this headline:

Loading spinner

InterceptSuite: Open-source network traffic interception tool Read More »

Cyber defense cannot be democratized

Cyber defense cannot be democratized 2025-09-08 at 08:14 By Help Net Security The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt

React to this headline:

Loading spinner

Cyber defense cannot be democratized Read More »

How to reclaim control over your online shopping data

How to reclaim control over your online shopping data 2025-09-05 at 09:33 By Sinisa Markovic Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks that might come with it? Where shopping

React to this headline:

Loading spinner

How to reclaim control over your online shopping data Read More »

File security risks rise as insiders, malware, and AI challenges converge

File security risks rise as insiders, malware, and AI challenges converge 2025-09-05 at 08:42 By Anamarija Pogorelec Breaches tied to file access are happening often, and the costs add up quickly. Many organizations have faced multiple file-related incidents over the last two years, with financial losses stretching into the millions. The fallout often includes stolen

React to this headline:

Loading spinner

File security risks rise as insiders, malware, and AI challenges converge Read More »

Connected cars are smart, convenient, and open to cyberattacks

Connected cars are smart, convenient, and open to cyberattacks 2025-09-05 at 07:32 By Sinisa Markovic Consumers are concerned about vulnerabilities in their vehicles, which directly impacts purchasing behavior and brand loyalty, according to RunSafe Security. Vehicles now run on over 100 million lines of code, which is more than most fighter jets, but they often

React to this headline:

Loading spinner

Connected cars are smart, convenient, and open to cyberattacks Read More »

macOS vulnerability allowed Keychain and iOS app decryption without a password

macOS vulnerability allowed Keychain and iOS app decryption without a password 2025-09-04 at 15:41 By Mirko Zorz Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability that allowed attackers to read the memory of any process, even with System Integrity Protection (SIP) enabled. The issue, tracked as CVE-2025-24204, stems from Apple mistakenly granting the

React to this headline:

Loading spinner

macOS vulnerability allowed Keychain and iOS app decryption without a password Read More »

Scroll to Top