cybersecurity

Half of enterprises suffer breaches despite heavy security investments

Half of enterprises suffer breaches despite heavy security investments 2024-08-27 at 06:32 By Help Net Security Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies to safeguard sensitive information. This […]

React to this headline:

Loading spinner

Half of enterprises suffer breaches despite heavy security investments Read More »

Two strategies to protect your business from the next large-scale tech failure

Two strategies to protect your business from the next large-scale tech failure 2024-08-26 at 06:47 By Help Net Security The CrowdStrike event in July clearly demonstrated the risks of allowing a software vendor deep access to network infrastructure. It also raised concerns about the concentration of digital services in the hands of a few companies.

React to this headline:

Loading spinner

Two strategies to protect your business from the next large-scale tech failure Read More »

Adversaries love bots, short-lived IP addresses, out-of-band domains

Adversaries love bots, short-lived IP addresses, out-of-band domains 2024-08-26 at 05:32 By Help Net Security Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. Industries ranked by

React to this headline:

Loading spinner

Adversaries love bots, short-lived IP addresses, out-of-band domains Read More »

Vulnerability prioritization is only the beginning

Vulnerability prioritization is only the beginning 2024-08-23 at 07:30 By Help Net Security To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or threat intelligence information.

React to this headline:

Loading spinner

Vulnerability prioritization is only the beginning Read More »

A survival guide for data privacy in the age of federal inaction

A survival guide for data privacy in the age of federal inaction 2024-08-22 at 07:31 By Help Net Security Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most frequently was, “How similar will the proposed federal privacy law (APRA) be to the EU’s GDPR?”

React to this headline:

Loading spinner

A survival guide for data privacy in the age of federal inaction Read More »

Why C-suite leaders are prime cyber targets

Why C-suite leaders are prime cyber targets 2024-08-22 at 06:32 By Help Net Security Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybersecurity Report, underscores the growing sophistication

React to this headline:

Loading spinner

Why C-suite leaders are prime cyber targets Read More »

GenAI models are easily compromised

GenAI models are easily compromised 2024-08-22 at 06:01 By Help Net Security 95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manipulate the applications, gain

React to this headline:

Loading spinner

GenAI models are easily compromised Read More »

Food security: Accelerating national protections around critical infrastructure

Food security: Accelerating national protections around critical infrastructure 2024-08-21 at 06:31 By Help Net Security In this Help Net Security video, Mike Lexa, CISO and Global VP of IT Infrastructure and Operations at CNH, discusses how the federal government is taking food security more seriously and what steps must be taken to prioritize security measures.

React to this headline:

Loading spinner

Food security: Accelerating national protections around critical infrastructure Read More »

New phishing method targets Android and iPhone users

New phishing method targets Android and iPhone users 2024-08-20 at 17:33 By Help Net Security ESET researchers discovered an uncommon type of phishing campaign targeting Android and iPhone users. They analyzed a case observed in the wild that targeted clients of a prominent Czech bank. PWA phishing flow (Source: ESET) This technique is noteworthy because

React to this headline:

Loading spinner

New phishing method targets Android and iPhone users Read More »

Strategies for security leaders: Building a positive cybersecurity culture

Strategies for security leaders: Building a positive cybersecurity culture 2024-08-20 at 07:32 By Help Net Security Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly enhance the perceived value, relevance and reputation of the cybersecurity function. So how can security

React to this headline:

Loading spinner

Strategies for security leaders: Building a positive cybersecurity culture Read More »

AI for application security: Balancing automation with human oversight

AI for application security: Balancing automation with human oversight 2024-08-20 at 07:01 By Mirko Zorz In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application security, exploring how it’s transforming threat detection and response. Wickert talks about integrating security testing throughout the development lifecycle, the

React to this headline:

Loading spinner

AI for application security: Balancing automation with human oversight Read More »

Cybercriminals exploit file sharing services to advance phishing attacks

Cybercriminals exploit file sharing services to advance phishing attacks 2024-08-20 at 06:01 By Help Net Security Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of phishing threat in which

React to this headline:

Loading spinner

Cybercriminals exploit file sharing services to advance phishing attacks Read More »

To improve your cybersecurity posture, focus on the data

To improve your cybersecurity posture, focus on the data 2024-08-19 at 07:31 By Help Net Security Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards exist within siloed systems and applications, and it requires a lot of manual effort by highly skilled data scientists,

React to this headline:

Loading spinner

To improve your cybersecurity posture, focus on the data Read More »

Protecting academic assets: How higher education can enhance cybersecurity

Protecting academic assets: How higher education can enhance cybersecurity 2024-08-19 at 06:31 By Help Net Security Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII (personally identifiable information).

React to this headline:

Loading spinner

Protecting academic assets: How higher education can enhance cybersecurity Read More »

Common API security issues: From exposed secrets to unauthorized access

Common API security issues: From exposed secrets to unauthorized access 2024-08-19 at 06:01 By Help Net Security Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, which attackers frequently misuse. The

React to this headline:

Loading spinner

Common API security issues: From exposed secrets to unauthorized access Read More »

Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32

Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32 2024-08-16 at 12:46 By Help Net Security I recently spent six days in Las Vegas attending DEF CON, BsidesLV, and Black Hat USA 2024, where I had the opportunity to engage with and learn from some of the top security experts in the world.

React to this headline:

Loading spinner

Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32 Read More »

Business and tech consolidation opens doors for cybercriminals

Business and tech consolidation opens doors for cybercriminals 2024-08-16 at 07:36 By Help Net Security Cyber threats continued to intensify in the first half of 2024 as cybercriminals exploited security gaps from growing business and technological consolidation, according to Resilience. Consolidation in business and tech fuels new third-party risks Rebounding merger and acquisition (M&A) activity

React to this headline:

Loading spinner

Business and tech consolidation opens doors for cybercriminals Read More »

74% of IT professionals worry AI tools will replace them

74% of IT professionals worry AI tools will replace them 2024-08-15 at 07:31 By Help Net Security 56% of security professionals are concerned about AI-powered threats, according to Pluralsight. Many organizations lack structured AI training Over half of surveyed technologists are either extremely concerned or moderately concerned about AI-powered threats, with only 6% saying they

React to this headline:

Loading spinner

74% of IT professionals worry AI tools will replace them Read More »

How passkeys eliminate password management headaches

How passkeys eliminate password management headaches 2024-08-15 at 07:01 By Mirko Zorz In this Help Net Security interview, David Cottingham, President at rf IDEAS, discusses the key benefits organizations can expect when implementing passkeys. Cottingham addresses the misconceptions surrounding the adoption of passkeys, particularly in the B2B landscape. What are the key benefits that organizations

React to this headline:

Loading spinner

How passkeys eliminate password management headaches Read More »

The AI balancing act: Unlocking potential, dealing with security issues, complexity

The AI balancing act: Unlocking potential, dealing with security issues, complexity 2024-08-15 at 06:31 By Help Net Security The rapid integration of AI and GenAI technologies creates a complex mix of challenges and opportunities for organizations. While the potential benefits are clear, many companies struggle with AI literacy, cautious adoption, and the risks of immature

React to this headline:

Loading spinner

The AI balancing act: Unlocking potential, dealing with security issues, complexity Read More »

Scroll to Top