Refresh

This website securityticks.com/category/cybersecurity/page/6/ is currently offline. Cloudflare's Always Online™ shows a snapshot of this web page from the Internet Archive's Wayback Machine. To check for the live version, click Refresh.

cybersecurity

Cybercriminals blend AI and social engineering to bypass detection

Cybercriminals blend AI and social engineering to bypass detection 2025-04-21 at 08:04 By Help Net Security Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense. Researchers analyzed thousands of alerts, mapping them to the MITRE ATT&CK framework, […]

React to this headline:

Loading spinner

Cybercriminals blend AI and social engineering to bypass detection Read More »

Cyber threats now a daily reality for one in three businesses

Cyber threats now a daily reality for one in three businesses 2025-04-21 at 07:40 By Help Net Security Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory hurdles and operational inefficiencies, according to research from FIS and Oxford Economics. The cost of disharmony is

React to this headline:

Loading spinner

Cyber threats now a daily reality for one in three businesses Read More »

Why CISOs are watching the GenAI supply chain shift closely

Why CISOs are watching the GenAI supply chain shift closely 2025-04-21 at 07:08 By Help Net Security In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders remain uneasy about what that means for data protection, legacy tech, and trust in automation. The survey of

React to this headline:

Loading spinner

Why CISOs are watching the GenAI supply chain shift closely Read More »

The UK’s phone theft crisis is a wake-up call for digital security

The UK’s phone theft crisis is a wake-up call for digital security 2025-04-18 at 09:02 By Help Net Security Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled

React to this headline:

Loading spinner

The UK’s phone theft crisis is a wake-up call for digital security Read More »

Securing digital products under the Cyber Resilience Act

Securing digital products under the Cyber Resilience Act 2025-04-18 at 08:37 By Mirko Zorz In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses the technical

React to this headline:

Loading spinner

Securing digital products under the Cyber Resilience Act Read More »

When ransomware strikes, what’s your move?

When ransomware strikes, what’s your move? 2025-04-18 at 08:37 By Sinisa Markovic Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about how it happened, it’s about what

React to this headline:

Loading spinner

When ransomware strikes, what’s your move? Read More »

SafeLine Bot Management: Self-hosted alternative to Cloudflare

SafeLine Bot Management: Self-hosted alternative to Cloudflare 2025-04-17 at 16:52 By Help Net Security Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While Cloudflare Bot Management is a powerful cloud-native solution that leverages massive data and machine learning, not every organization wants to rely

React to this headline:

Loading spinner

SafeLine Bot Management: Self-hosted alternative to Cloudflare Read More »

Cyber threats against energy sector surge as global tensions mount

Cyber threats against energy sector surge as global tensions mount 2025-04-17 at 12:02 By Help Net Security Cyberattacks targeting the energy sector are increasing, driven by a host of geopolitical and technological factors. A report published by Sophos in July 2024, and which surveyed 275 cybersecurity and IT leaders from the energy, oil/gas, and utilities

React to this headline:

Loading spinner

Cyber threats against energy sector surge as global tensions mount Read More »

When AI agents go rogue, the fallout hits the enterprise

When AI agents go rogue, the fallout hits the enterprise 2025-04-17 at 08:45 By Mirko Zorz In this Help Net Security interview, Jason Lord, CTO at AutoRABIT, discusses the cybersecurity risks posed by AI agents integrated into real-world systems. Issues like hallucinations, prompt injections, and embedded biases can turn these systems into vulnerable targets. Lord

React to this headline:

Loading spinner

When AI agents go rogue, the fallout hits the enterprise Read More »

Microsoft vulnerabilities: What’s improved, what’s at risk

Microsoft vulnerabilities: What’s improved, what’s at risk 2025-04-17 at 08:02 By Help Net Security Microsoft reported a record 1,360 vulnerabilities in 2024, according to the latest BeyondTrust Microsoft Vulnerabilities Report. The volume marks an 11% increase from the previous record in 2022 and fits within a broader post-pandemic trend: more vulnerabilities, more products, and more

React to this headline:

Loading spinner

Microsoft vulnerabilities: What’s improved, what’s at risk Read More »

When companies merge, so do their cyber threats

When companies merge, so do their cyber threats 2025-04-16 at 09:13 By Mirko Zorz For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security

React to this headline:

Loading spinner

When companies merge, so do their cyber threats Read More »

Strategic AI readiness for cybersecurity: From hype to reality

Strategic AI readiness for cybersecurity: From hype to reality 2025-04-16 at 08:34 By Help Net Security AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they fail to exploit AI

React to this headline:

Loading spinner

Strategic AI readiness for cybersecurity: From hype to reality Read More »

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques 2025-04-16 at 08:01 By Help Net Security MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their objectives, Attack Flow offers defenders, analysts, and decision-makers a tool to

React to this headline:

Loading spinner

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques Read More »

The future of authentication: Why passwordless is the way forward

The future of authentication: Why passwordless is the way forward 2025-04-16 at 07:35 By Sinisa Markovic By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. That’s why passwordless

React to this headline:

Loading spinner

The future of authentication: Why passwordless is the way forward Read More »

Why shorter SSL/TLS certificate lifespans matter

Why shorter SSL/TLS certificate lifespans matter 2025-04-15 at 09:31 By Help Net Security Digital certificates are the unsung heroes of the internet, silently verifying that the websites, apps, and services you use are legit and your data is safe. For years, we’ve leaned on certificates with maximum validity term stretching for months and, in some

React to this headline:

Loading spinner

Why shorter SSL/TLS certificate lifespans matter Read More »

Cybercriminal groups embrace corporate structures to scale, sustain operations

Cybercriminal groups embrace corporate structures to scale, sustain operations 2025-04-15 at 08:33 By Mirko Zorz In this Help Net Security interview, Sandy Kronenberg, CEO of Netarx, discusses how cybercriminal groups are adopting corporate structures and employee incentives to scale operations, retain talent, and evade detection. He covers the strategic collaborations behind major attacks, business-like parallels,

React to this headline:

Loading spinner

Cybercriminal groups embrace corporate structures to scale, sustain operations Read More »

94% of firms say pentesting is essential, but few are doing it right

94% of firms say pentesting is essential, but few are doing it right 2025-04-15 at 08:05 By Help Net Security Organizations are fixing less than half of all exploitable vulnerabilities, with just 21% of GenAI app flaws being resolved, according to Cobalt. Big firms take longer to fix pentest issues 94% of firms view pentesting

React to this headline:

Loading spinner

94% of firms say pentesting is essential, but few are doing it right Read More »

Chief Legal Officers step up in cybersecurity oversight

Chief Legal Officers step up in cybersecurity oversight 2025-04-15 at 07:42 By Help Net Security In this Help Net Security video, Jennifer Chen, Executive Director of the Association of Corporate Counsel (ACC) Foundation, discusses how globally, Chief Legal Officers (CLOs) are becoming integral leaders in cybersecurity strategy, holding leadership positions, and frequently reporting cybersecurity strategies

React to this headline:

Loading spinner

Chief Legal Officers step up in cybersecurity oversight Read More »

The quiet data breach hiding in AI workflows

The quiet data breach hiding in AI workflows 2025-04-14 at 08:30 By Mirko Zorz As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions. They are a natural outcome of how employees use large language models. CISOs cannot treat this as a secondary concern. To

React to this headline:

Loading spinner

The quiet data breach hiding in AI workflows Read More »

Sector by sector: How data breaches are wrecking bottom lines

Sector by sector: How data breaches are wrecking bottom lines 2025-04-14 at 07:35 By Anamarija Pogorelec Data breaches are rising across industries, hitting healthcare, finance, and retail especially hard. The damage goes beyond lost data, as it’s financial, operational, and reputational. The post Sector by sector: How data breaches are wrecking bottom lines appeared first

React to this headline:

Loading spinner

Sector by sector: How data breaches are wrecking bottom lines Read More »

Scroll to Top