cybersecurity

Coaching AI agents: Why your next security hire might be an algorithm

Coaching AI agents: Why your next security hire might be an algorithm 2025-04-24 at 08:31 By Help Net Security Security teams are drowning in alerts. The sheer volume of threats, suspicious activity, and false positives makes it nearly impossible for analysts to investigate everything effectively. Enter agentic AI, capable of completing hundreds of tasks simultaneously […]

React to this headline:

Loading spinner

Coaching AI agents: Why your next security hire might be an algorithm Read More »

A new era of cyber threats is approaching for the energy sector

A new era of cyber threats is approaching for the energy sector 2025-04-24 at 08:17 By Sinisa Markovic Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful attack can be severe, potentially

React to this headline:

Loading spinner

A new era of cyber threats is approaching for the energy sector Read More »

Review: Artificial Intelligence for Cybersecurity

Review: Artificial Intelligence for Cybersecurity 2025-04-24 at 07:39 By Mirko Zorz Artificial Intelligence for Cybersecurity is a practical guide to how AI and machine learning are changing the way we defend digital systems. The book aims to explain how AI can help solve real cybersecurity problems. It does that well, but it’s not for everyone.

React to this headline:

Loading spinner

Review: Artificial Intelligence for Cybersecurity Read More »

One in three security teams trust AI to act autonomously

One in three security teams trust AI to act autonomously 2025-04-24 at 07:39 By Help Net Security While AI adoption is widespread, its impact on productivity, trust, and team structure varies sharply by role and region, according to Exabeam. The findings confirm a critical divide: 71% of executives believe AI has significantly improved productivity across

React to this headline:

Loading spinner

One in three security teams trust AI to act autonomously Read More »

2025 Data Breach Investigations Report: Third-party breaches double

2025 Data Breach Investigations Report: Third-party breaches double 2025-04-23 at 14:55 By Sinisa Markovic The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according to Verizon’s 2025 Data Breach Investigations Report. Researchers analyzed 22,052 real-world security incidents, of which 12,195 were confirmed data breaches. This

React to this headline:

Loading spinner

2025 Data Breach Investigations Report: Third-party breaches double Read More »

When confusion becomes a weapon: How cybercriminals exploit economic turmoil

When confusion becomes a weapon: How cybercriminals exploit economic turmoil 2025-04-23 at 09:02 By Help Net Security It begins with a simple notification: “Markets in Free Fall.” Within moments, the headlines multiply: new tariffs, emergency actions, plummeting consumer confidence. Across boardrooms and break rooms, anxiety ripples at every level. People begin refreshing inboxes and apps

React to this headline:

Loading spinner

When confusion becomes a weapon: How cybercriminals exploit economic turmoil Read More »

The dark side of YouTube: Malicious links, phishing, and deepfakes

The dark side of YouTube: Malicious links, phishing, and deepfakes 2025-04-23 at 08:01 By Sinisa Markovic With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and comments. Some send phishing emails to creators, posing as sponsors but attaching malware. Others hijack popular channels to promote

React to this headline:

Loading spinner

The dark side of YouTube: Malicious links, phishing, and deepfakes Read More »

Phishing emails delivering infostealers surge 84%

Phishing emails delivering infostealers surge 84% 2025-04-23 at 07:31 By Help Net Security Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM. Researchers observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied

React to this headline:

Loading spinner

Phishing emails delivering infostealers surge 84% Read More »

The legal blind spot of shadow IT

The legal blind spot of shadow IT 2025-04-22 at 09:36 By Mirko Zorz Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance violations, expose sensitive data, or break contracts. Let’s look at where the legal landmines are and what CISOs can do to stay

React to this headline:

Loading spinner

The legal blind spot of shadow IT Read More »

The C-suite gap that’s putting your company at risk

The C-suite gap that’s putting your company at risk 2025-04-22 at 08:03 By Help Net Security New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on how exposed their companies are or where the biggest threats come from. CISOs more concerned about cybersecurity (Source: EY

React to this headline:

Loading spinner

The C-suite gap that’s putting your company at risk Read More »

What school IT admins are up against, and how to help them win

What school IT admins are up against, and how to help them win 2025-04-22 at 07:33 By Anamarija Pogorelec School IT admins are doing tough, important work under difficult conditions. From keeping Wi-Fi stable during exams to locking down systems from phishing emails, their job is part technician, part strategist, part firefighter. But they’re stretched

React to this headline:

Loading spinner

What school IT admins are up against, and how to help them win Read More »

Compliance weighs heavily on security and GRC teams

Compliance weighs heavily on security and GRC teams 2025-04-22 at 07:24 By Help Net Security Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report reveals that fragmented workflows, manual evidence gathering and poor collaboration between security and governance, risk and compliance (GRC) teams are

React to this headline:

Loading spinner

Compliance weighs heavily on security and GRC teams Read More »

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms 2025-04-21 at 08:37 By Mirko Zorz Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line and checks many types of storage for PII and secrets: passwords, API keys, and personal information. “Unlike most open-source

React to this headline:

Loading spinner

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms Read More »

Cybercriminals blend AI and social engineering to bypass detection

Cybercriminals blend AI and social engineering to bypass detection 2025-04-21 at 08:04 By Help Net Security Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense. Researchers analyzed thousands of alerts, mapping them to the MITRE ATT&CK framework,

React to this headline:

Loading spinner

Cybercriminals blend AI and social engineering to bypass detection Read More »

Cyber threats now a daily reality for one in three businesses

Cyber threats now a daily reality for one in three businesses 2025-04-21 at 07:40 By Help Net Security Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory hurdles and operational inefficiencies, according to research from FIS and Oxford Economics. The cost of disharmony is

React to this headline:

Loading spinner

Cyber threats now a daily reality for one in three businesses Read More »

Why CISOs are watching the GenAI supply chain shift closely

Why CISOs are watching the GenAI supply chain shift closely 2025-04-21 at 07:08 By Help Net Security In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders remain uneasy about what that means for data protection, legacy tech, and trust in automation. The survey of

React to this headline:

Loading spinner

Why CISOs are watching the GenAI supply chain shift closely Read More »

The UK’s phone theft crisis is a wake-up call for digital security

The UK’s phone theft crisis is a wake-up call for digital security 2025-04-18 at 09:02 By Help Net Security Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled

React to this headline:

Loading spinner

The UK’s phone theft crisis is a wake-up call for digital security Read More »

Securing digital products under the Cyber Resilience Act

Securing digital products under the Cyber Resilience Act 2025-04-18 at 08:37 By Mirko Zorz In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses the technical

React to this headline:

Loading spinner

Securing digital products under the Cyber Resilience Act Read More »

When ransomware strikes, what’s your move?

When ransomware strikes, what’s your move? 2025-04-18 at 08:37 By Sinisa Markovic Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about how it happened, it’s about what

React to this headline:

Loading spinner

When ransomware strikes, what’s your move? Read More »

SafeLine Bot Management: Self-hosted alternative to Cloudflare

SafeLine Bot Management: Self-hosted alternative to Cloudflare 2025-04-17 at 16:52 By Help Net Security Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While Cloudflare Bot Management is a powerful cloud-native solution that leverages massive data and machine learning, not every organization wants to rely

React to this headline:

Loading spinner

SafeLine Bot Management: Self-hosted alternative to Cloudflare Read More »

Scroll to Top