cybersecurity

Why outsourcing cybersecurity is rising in the Adriatic region

Why outsourcing cybersecurity is rising in the Adriatic region 2025-07-24 at 11:57 By Mirko Zorz In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the Adriatic region. He talks about how local markets often lag behind EU regulations, despite facing threats comparable to those in […]

React to this headline:

Loading spinner

Why outsourcing cybersecurity is rising in the Adriatic region Read More »

Autoswagger: Open-source tool to expose hidden API authorization flaws

Autoswagger: Open-source tool to expose hidden API authorization flaws 2025-07-24 at 11:57 By Help Net Security Autoswagger is a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even at large enterprises with mature security teams, and are especially dangerous because they can be exploited with little technical

React to this headline:

Loading spinner

Autoswagger: Open-source tool to expose hidden API authorization flaws Read More »

Most data breaches have unknown causes as transparency continues to fall

Most data breaches have unknown causes as transparency continues to fall 2025-07-24 at 11:57 By Help Net Security The Identity Theft Resource Center (ITRC) reports 1,732 publicly disclosed data breaches in H1 2025, marking a 5% increase over the same period in 2024. The ITRC could track a record number of compromises in 2025 if

React to this headline:

Loading spinner

Most data breaches have unknown causes as transparency continues to fall Read More »

Your app is under attack every 3 minutes

Your app is under attack every 3 minutes 2025-07-24 at 11:57 By Help Net Security Application-layer attacks have become one of the most common and consequential methods adversaries use to gain access and compromise organizations, according to Contrast Security. These attacks target the custom code, APIs, and logic that power applications, often slipping past detection

React to this headline:

Loading spinner

Your app is under attack every 3 minutes Read More »

Cervantes: Open-source, collaborative platform for pentesters and red teams

Cervantes: Open-source, collaborative platform for pentesters and red teams 2025-07-23 at 08:31 By Mirko Zorz Cervantes is an open-source collaborative platform built for pentesters and red teams. It offers a centralized workspace to manage projects, clients, vulnerabilities, and reports, all in one place. By streamlining data organization and team coordination, it helps reduce the time

React to this headline:

Loading spinner

Cervantes: Open-source, collaborative platform for pentesters and red teams Read More »

Phishing simulations: What works and what doesn’t

Phishing simulations: What works and what doesn’t 2025-07-23 at 08:31 By Sinisa Markovic Phishing is one of the oldest and most effective scams used by cybercriminals. No one is immune to them, not even internet security experts, as seen in the case of Troy Hunt, who recently fell for a phishing email. Before AI became

React to this headline:

Loading spinner

Phishing simulations: What works and what doesn’t Read More »

Ports are getting smarter and more hackable

Ports are getting smarter and more hackable 2025-07-23 at 08:31 By Sinisa Markovic A new policy brief from NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) warns that critical port infrastructure, responsible for 80 percent of global trade, is increasingly under attack by threat actors tied to Russia, Iran, and China. These ports are essential

React to this headline:

Loading spinner

Ports are getting smarter and more hackable Read More »

The fraud trends shaping 2025: Pressure builds on online retailers

The fraud trends shaping 2025: Pressure builds on online retailers 2025-07-23 at 07:12 By Anamarija Pogorelec Fraud is growing faster than revenue in eCommerce. That’s one of the first things PwC and Forter point out in their new report, and it’s a wake-up call for online retailers. Fraud is rising faster than ever Right now,

React to this headline:

Loading spinner

The fraud trends shaping 2025: Pressure builds on online retailers Read More »

Enterprise printer security fails at every stage

Enterprise printer security fails at every stage 2025-07-22 at 10:13 By Help Net Security Printer platform security is often overlooked in enterprise security strategies, creating security gaps, according to HP Wolf Security. By addressing security at every stage, organizations can strengthen their defenses and ensure their print infrastructure remains a trusted part of their IT

React to this headline:

Loading spinner

Enterprise printer security fails at every stage Read More »

What the law says about your next data breach

What the law says about your next data breach 2025-07-22 at 10:13 By Help Net Security In this Help Net Security video, Chad Humphries, Solution Consultant, Networks & Cyber Security at Rockwell Automation, explores how cyber risk quantification is becoming essential for modern organizations. He breaks down global legal frameworks, AI’s growing role in dispute

React to this headline:

Loading spinner

What the law says about your next data breach Read More »

As AI tools take hold in cybersecurity, entry-level jobs could shrink

As AI tools take hold in cybersecurity, entry-level jobs could shrink 2025-07-22 at 10:13 By Sinisa Markovic A new survey from ISC2 shows that nearly a third of cybersecurity professionals are already using AI security tools, and many others are close behind. So far, 30 percent of professionals say they’ve already integrated AI into their

React to this headline:

Loading spinner

As AI tools take hold in cybersecurity, entry-level jobs could shrink Read More »

How to land your first job in cybersecurity

How to land your first job in cybersecurity 2025-07-21 at 09:54 By Help Net Security According to LinkedIn, job applications have surged over 45% in the past year, with 11,000 applications submitted every minute. This flood of applications is making it harder than ever for qualified candidates to stand out. The industry has become highly

React to this headline:

Loading spinner

How to land your first job in cybersecurity Read More »

World Health Organization CISO on securing global health emergencies

World Health Organization CISO on securing global health emergencies 2025-07-21 at 08:49 By Mirko Zorz In this Help Net Security interview, Flavio Aggio, CISO at the World Health Organization (WHO), explains how the organization prepares for and responds to cyber threats during global health emergencies. These crises often lead to an increase in phishing scams,

React to this headline:

Loading spinner

World Health Organization CISO on securing global health emergencies Read More »

Cyber turbulence ahead as airlines strap in for a security crisis

Cyber turbulence ahead as airlines strap in for a security crisis 2025-07-21 at 07:35 By Sinisa Markovic Aircraft systems are getting more connected and ground operations increasingly integrated, and attackers are taking notice. They’re shifting from minor disruptions to targeting critical systems with serious intent. Any time an aircraft transmits data, whether it’s flight position

React to this headline:

Loading spinner

Cyber turbulence ahead as airlines strap in for a security crisis Read More »

Are your employees using Chinese GenAI tools at work?

Are your employees using Chinese GenAI tools at work? 2025-07-21 at 07:35 By Anamarija Pogorelec Nearly one in 12 employees are using Chinese-developed generative AI tools at work, and they’re exposing sensitive data in the process. That’s according to new research from Harmonic Security, which analyzed the behavior of roughly 14,000 end users in the

React to this headline:

Loading spinner

Are your employees using Chinese GenAI tools at work? Read More »

Why we must go beyond tooling and CVEs to illuminate security blind spots

Why we must go beyond tooling and CVEs to illuminate security blind spots 2025-07-18 at 09:41 By Help Net Security In April, the cybersecurity community held its breath as the Common Vulnerabilities and Exposures (CVE) program was plunged into a moment of existential crisis. In the end, an eleventh-hour reprieve saved the day. While CVEs

React to this headline:

Loading spinner

Why we must go beyond tooling and CVEs to illuminate security blind spots Read More »

Making security and development co-owners of DevSecOps

Making security and development co-owners of DevSecOps 2025-07-18 at 09:41 By Mirko Zorz In this Help Net Security interview, Galal Ibrahim Maghola, former Head of Cybersecurity at G42 Company, discusses strategic approaches to implementing DevSecOps at scale. Drawing on experience in regulated industries such as finance, telecom, and critical infrastructure, he offers tips on ownership

React to this headline:

Loading spinner

Making security and development co-owners of DevSecOps Read More »

AI adoption is booming but secure scaling not so much

AI adoption is booming but secure scaling not so much 2025-07-18 at 09:35 By Help Net Security 96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML and intelligent apps might soon affect its operations, according to F5. Only 2% of global organizations are highly

React to this headline:

Loading spinner

AI adoption is booming but secure scaling not so much Read More »

Review: Passwork 7.0, self-hosted password manager for business

Review: Passwork 7.0, self-hosted password manager for business 2025-07-17 at 13:09 By Help Net Security Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call “the age of innocence,” we scribbled passwords on paper or reused “password123” across

React to this headline:

Loading spinner

Review: Passwork 7.0, self-hosted password manager for business Read More »

What a mature OT security program looks like in practice

What a mature OT security program looks like in practice 2025-07-17 at 09:08 By Mirko Zorz In this Help Net Security interview, Cindy Segond von Banchet CC, Cybersecurity Lead at Yokogawa Europe, shares her insights on what defines a sustainable OT security program. She outlines the key differences between short-term fixes and long-term resilience, and

React to this headline:

Loading spinner

What a mature OT security program looks like in practice Read More »

Scroll to Top