cybersecurity

Product showcase: Ledger Flex secure crypto wallet

Product showcase: Ledger Flex secure crypto wallet 2025-04-30 at 09:02 By Sinisa Markovic The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features with a user-friendly interface, making it suitable for both beginners and more experienced users. Ledger Flex stores your private keys offline. This […]

React to this headline:

Loading spinner

Product showcase: Ledger Flex secure crypto wallet Read More »

Securing the invisible: Supply chain security trends

Securing the invisible: Supply chain security trends 2025-04-30 at 07:34 By Anamarija Pogorelec Adversaries are infiltrating upstream software, hardware, and vendor relationships to quietly compromise downstream targets. Whether it’s a malicious update injected into a CI/CD pipeline, a rogue dependency hidden in open-source code, or tampered hardware components, these attacks bypass traditional defenses by weaponizing

React to this headline:

Loading spinner

Securing the invisible: Supply chain security trends Read More »

Why cyber resilience must be part of every organization’s DNA

Why cyber resilience must be part of every organization’s DNA 2025-04-30 at 07:05 By Help Net Security As AI brings about excitement and transformative potential, the report reveals that organizations are forging ahead with innovations despite increased security concerns, according to LevelBlue’s 2025 Futures Report. In fact, just 29% of executives surveyed say they are

React to this headline:

Loading spinner

Why cyber resilience must be part of every organization’s DNA Read More »

Eyes, ears, and now arms: IoT is alive

Eyes, ears, and now arms: IoT is alive 2025-04-29 at 09:36 By Help Net Security I’ve never quite seen anything like this in my two decades of working in the Internet of Things (IoT) space. In just a few years, devices at home and work started including cameras to see and microphones to hear. Now,

React to this headline:

Loading spinner

Eyes, ears, and now arms: IoT is alive Read More »

What’s worth automating in cyber hygiene, and what’s not

What’s worth automating in cyber hygiene, and what’s not 2025-04-29 at 09:05 By Mirko Zorz Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy fast. Systems number in the thousands. Teams are scattered. Some machines haven’t been rebooted in months. Automation can help. But

React to this headline:

Loading spinner

What’s worth automating in cyber hygiene, and what’s not Read More »

Want faster products and stronger trust? Build security in, not bolt it on

Want faster products and stronger trust? Build security in, not bolt it on 2025-04-29 at 08:42 By Mirko Zorz In this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity strategy. He explains why security must be embedded across IT, business lines, and product development, how

React to this headline:

Loading spinner

Want faster products and stronger trust? Build security in, not bolt it on Read More »

DDoS attacks jump 358% compared to last year

DDoS attacks jump 358% compared to last year 2025-04-29 at 08:04 By Mirko Zorz Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared to the same time last year. Their Q1 2025 DDoS report highlights a rise in the number and size of attacks,

React to this headline:

Loading spinner

DDoS attacks jump 358% compared to last year Read More »

Investing in security? It’s not helping you fix what matters faster

Investing in security? It’s not helping you fix what matters faster 2025-04-29 at 07:30 By Help Net Security Automation and structured collaboration have a strong, positive influence on the efficiency of vulnerability management, according to Seemplicity. However, manual processes, unstructured workflows, and excessive noise from vulnerability scanning tools continue to slow remediation efforts, leading to

React to this headline:

Loading spinner

Investing in security? It’s not helping you fix what matters faster Read More »

Ransomware attacks are getting smarter, harder to stop

Ransomware attacks are getting smarter, harder to stop 2025-04-28 at 07:36 By Help Net Security Ransomware attacks are becoming more refined and pervasive, posing significant challenges to organizations globally. A Veeam report reveals that while the percentage of companies impacted by ransomware attacks has slightly declined from 75% to 69%, the threat remains substantial. This

React to this headline:

Loading spinner

Ransomware attacks are getting smarter, harder to stop Read More »

Most critical vulnerabilities aren’t worth your attention

Most critical vulnerabilities aren’t worth your attention 2025-04-28 at 07:03 By Help Net Security Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still contain at least one vulnerability By analyzing

React to this headline:

Loading spinner

Most critical vulnerabilities aren’t worth your attention Read More »

Exposure validation emerges as critical cyber defense component

Exposure validation emerges as critical cyber defense component 2025-04-25 at 08:13 By Help Net Security Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to Cymulate. At the same time, nearly all respondents say

React to this headline:

Loading spinner

Exposure validation emerges as critical cyber defense component Read More »

Coaching AI agents: Why your next security hire might be an algorithm

Coaching AI agents: Why your next security hire might be an algorithm 2025-04-24 at 08:31 By Help Net Security Security teams are drowning in alerts. The sheer volume of threats, suspicious activity, and false positives makes it nearly impossible for analysts to investigate everything effectively. Enter agentic AI, capable of completing hundreds of tasks simultaneously

React to this headline:

Loading spinner

Coaching AI agents: Why your next security hire might be an algorithm Read More »

A new era of cyber threats is approaching for the energy sector

A new era of cyber threats is approaching for the energy sector 2025-04-24 at 08:17 By Sinisa Markovic Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful attack can be severe, potentially

React to this headline:

Loading spinner

A new era of cyber threats is approaching for the energy sector Read More »

Review: Artificial Intelligence for Cybersecurity

Review: Artificial Intelligence for Cybersecurity 2025-04-24 at 07:39 By Mirko Zorz Artificial Intelligence for Cybersecurity is a practical guide to how AI and machine learning are changing the way we defend digital systems. The book aims to explain how AI can help solve real cybersecurity problems. It does that well, but it’s not for everyone.

React to this headline:

Loading spinner

Review: Artificial Intelligence for Cybersecurity Read More »

One in three security teams trust AI to act autonomously

One in three security teams trust AI to act autonomously 2025-04-24 at 07:39 By Help Net Security While AI adoption is widespread, its impact on productivity, trust, and team structure varies sharply by role and region, according to Exabeam. The findings confirm a critical divide: 71% of executives believe AI has significantly improved productivity across

React to this headline:

Loading spinner

One in three security teams trust AI to act autonomously Read More »

2025 Data Breach Investigations Report: Third-party breaches double

2025 Data Breach Investigations Report: Third-party breaches double 2025-04-23 at 14:55 By Sinisa Markovic The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according to Verizon’s 2025 Data Breach Investigations Report. Researchers analyzed 22,052 real-world security incidents, of which 12,195 were confirmed data breaches. This

React to this headline:

Loading spinner

2025 Data Breach Investigations Report: Third-party breaches double Read More »

When confusion becomes a weapon: How cybercriminals exploit economic turmoil

When confusion becomes a weapon: How cybercriminals exploit economic turmoil 2025-04-23 at 09:02 By Help Net Security It begins with a simple notification: “Markets in Free Fall.” Within moments, the headlines multiply: new tariffs, emergency actions, plummeting consumer confidence. Across boardrooms and break rooms, anxiety ripples at every level. People begin refreshing inboxes and apps

React to this headline:

Loading spinner

When confusion becomes a weapon: How cybercriminals exploit economic turmoil Read More »

The dark side of YouTube: Malicious links, phishing, and deepfakes

The dark side of YouTube: Malicious links, phishing, and deepfakes 2025-04-23 at 08:01 By Sinisa Markovic With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and comments. Some send phishing emails to creators, posing as sponsors but attaching malware. Others hijack popular channels to promote

React to this headline:

Loading spinner

The dark side of YouTube: Malicious links, phishing, and deepfakes Read More »

Phishing emails delivering infostealers surge 84%

Phishing emails delivering infostealers surge 84% 2025-04-23 at 07:31 By Help Net Security Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM. Researchers observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied

React to this headline:

Loading spinner

Phishing emails delivering infostealers surge 84% Read More »

The legal blind spot of shadow IT

The legal blind spot of shadow IT 2025-04-22 at 09:36 By Mirko Zorz Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance violations, expose sensitive data, or break contracts. Let’s look at where the legal landmines are and what CISOs can do to stay

React to this headline:

Loading spinner

The legal blind spot of shadow IT Read More »

Scroll to Top