cybersecurity

Passwordless adoption moves from hype to habit

Passwordless adoption moves from hype to habit 2025-10-31 at 08:00 By Anamarija Pogorelec With the average person juggling more than 300 credentials and credential abuse still the top attack vector, the password’s decline is long overdue. Across every major sector, organizations are changing how users log in, and new data shows the shift is picking […]

React to this headline:

Loading spinner

Passwordless adoption moves from hype to habit Read More »

Email breaches are the silent killers of business growth

Email breaches are the silent killers of business growth 2025-10-30 at 07:16 By Anamarija Pogorelec 78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and data

React to this headline:

Loading spinner

Email breaches are the silent killers of business growth Read More »

OpenAI’s gpt-oss-safeguard enables developers to build safer AI

OpenAI’s gpt-oss-safeguard enables developers to build safer AI 2025-10-29 at 19:07 By Sinisa Markovic OpenAI is releasing a research preview of gpt-oss-safeguard, a set of open-weight reasoning models for safety classification. The models come in two sizes: gpt-oss-safeguard-120b and gpt-oss-safeguard-20b. Both are fine-tuned versions of the gpt-oss open models and available under the Apache 2.0

React to this headline:

Loading spinner

OpenAI’s gpt-oss-safeguard enables developers to build safer AI Read More »

AI agents can leak company data through simple web searches

AI agents can leak company data through simple web searches 2025-10-29 at 10:24 By Mirko Zorz When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull

React to this headline:

Loading spinner

AI agents can leak company data through simple web searches Read More »

Early reporting helps credit unions stop fraudulent transfers faster

Early reporting helps credit unions stop fraudulent transfers faster 2025-10-29 at 08:48 By Mirko Zorz In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to an evolving fraud landscape and strengthening payment security. As cybercriminals leverage social engineering and AI-driven tactics, Scaffidi explains how innovation

React to this headline:

Loading spinner

Early reporting helps credit unions stop fraudulent transfers faster Read More »

Scammers target international students by threatening their visa status

Scammers target international students by threatening their visa status 2025-10-29 at 08:29 By Sinisa Markovic In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university staff, they took advantage

React to this headline:

Loading spinner

Scammers target international students by threatening their visa status Read More »

Managing legacy medical devices that can no longer be patched

Managing legacy medical devices that can no longer be patched 2025-10-28 at 10:22 By Mirko Zorz In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in healthcare environments. She explains how organizations can protect legacy systems, collaborate with vendors, and

React to this headline:

Loading spinner

Managing legacy medical devices that can no longer be patched Read More »

Chain of security weaknesses found in smart air compressor model

Chain of security weaknesses found in smart air compressor model 2025-10-28 at 10:22 By Sinisa Markovic Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience can introduce new risks. Researchers at George Mason University found that the California

React to this headline:

Loading spinner

Chain of security weaknesses found in smart air compressor model Read More »

Can your earbuds recognize you? Researchers are working on it

Can your earbuds recognize you? Researchers are working on it 2025-10-27 at 09:05 By Mirko Zorz Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step could be inside the ear. New research explores how the ear canal’s unique acoustic properties can be used to

React to this headline:

Loading spinner

Can your earbuds recognize you? Researchers are working on it Read More »

DDoS, data theft, and malware are storming the gaming industry

DDoS, data theft, and malware are storming the gaming industry 2025-10-27 at 08:46 By Sinisa Markovic When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More players meant more logins, payments, and personal

React to this headline:

Loading spinner

DDoS, data theft, and malware are storming the gaming industry Read More »

Dependency-Track: Open-source component analysis platform

Dependency-Track: Open-source component analysis platform 2025-10-27 at 08:46 By Sinisa Markovic Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles that problem head-on. Rather than treating software composition as a one-time scan, it continuously monitors every version of every

React to this headline:

Loading spinner

Dependency-Track: Open-source component analysis platform Read More »

AI writes code like a junior dev, and security is feeling it

AI writes code like a junior dev, and security is feeling it 2025-10-27 at 08:46 By Anamarija Pogorelec The industry is entering a phase where code is being deployed faster than it can be secured, according to OX Security. Findings from the Army of Juniors: The AI Code Security Crisis report show that AI-generated code

React to this headline:

Loading spinner

AI writes code like a junior dev, and security is feeling it Read More »

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense 2025-10-24 at 10:42 By Anamarija Pogorelec Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers describe a year in which criminal and state-backed actors blurred the lines between cybercrime, espionage, and

React to this headline:

Loading spinner

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense Read More »

Building trust in AI: How to keep humans in control of cybersecurity

Building trust in AI: How to keep humans in control of cybersecurity 2025-10-24 at 10:42 By Help Net Security In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype from reality. She explains why AI’s true value lies not in replacing human expertise but in

React to this headline:

Loading spinner

Building trust in AI: How to keep humans in control of cybersecurity Read More »

Smart helmet tech points to the future of fighting audio deepfakes

Smart helmet tech points to the future of fighting audio deepfakes 2025-10-24 at 10:42 By Sinisa Markovic Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate a person’s voice with matching tone, rhythm, and accent. To address that risk, a research team at Texas

React to this headline:

Loading spinner

Smart helmet tech points to the future of fighting audio deepfakes Read More »

When AI writes code, humans clean up the mess

When AI writes code, humans clean up the mess 2025-10-24 at 10:42 By Anamarija Pogorelec AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with a price. A new report from Aikido Security shows that most organizations now use AI to write production code, and

React to this headline:

Loading spinner

When AI writes code, humans clean up the mess Read More »

Faster LLM tool routing comes with new security considerations

Faster LLM tool routing comes with new security considerations 2025-10-23 at 09:23 By Sinisa Markovic Large language models depend on outside tools to perform real-world tasks, but connecting them to those tools often slows them down or causes failures. A new study from the University of Hong Kong proposes a way to fix that. The

React to this headline:

Loading spinner

Faster LLM tool routing comes with new security considerations Read More »

The next cyber crisis may start in someone else’s supply chain

The next cyber crisis may start in someone else’s supply chain 2025-10-23 at 09:23 By Anamarija Pogorelec Organizations are getting better at some aspects of risk management but remain underprepared for the threats reshaping the business landscape, according to a new Riskonnect report. The findings show a growing gap between awareness and action as technology,

React to this headline:

Loading spinner

The next cyber crisis may start in someone else’s supply chain Read More »

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector 2025-10-23 at 09:23 By Sinisa Markovic ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This latest activity targeted several European defense contractors, including firms deeply involved in drone and

React to this headline:

Loading spinner

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector Read More »

Your wearable knows your heartbeat, but who else does?

Your wearable knows your heartbeat, but who else does? 2025-10-23 at 09:23 By Sinisa Markovic Smartwatches, glucose sensors, and connected drug-monitoring devices are common in care programs. Remote monitoring helps detect changes early and supports personalized treatment and long-term condition management. They give clinicians valuable insight into patient health but also introduce new exposure points.

React to this headline:

Loading spinner

Your wearable knows your heartbeat, but who else does? Read More »

Scroll to Top