cybersecurity

The hidden dangers of a toxic cybersecurity workplace

The hidden dangers of a toxic cybersecurity workplace 2025-02-03 at 07:35 By Mirko Zorz In this Help Net Security interview, Rob Lee, Chief of Research and Head of Faculty at SANS Institute, discusses what a toxic environment looks like and how professionals can recognize red flags such as high turnover, burnout, and a pervasive fear […]

React to this headline:

Loading spinner

The hidden dangers of a toxic cybersecurity workplace Read More »

Only 3% of organizations have a dedicated budget for SaaS security

Only 3% of organizations have a dedicated budget for SaaS security 2025-02-03 at 06:48 By Help Net Security Mid-market organizations are grappling with managing the large volume of SaaS applications, both sanctioned and unsanctioned, with actual numbers often exceeding expectations, according to Cloud Security Alliance. Security teams are struggling with a growing attack surface Disconcertingly,

React to this headline:

Loading spinner

Only 3% of organizations have a dedicated budget for SaaS security Read More »

How to use iCloud Private Relay for enhanced privacy

How to use iCloud Private Relay for enhanced privacy 2025-02-03 at 06:04 By Help Net Security iCloud Private Relay, included with an iCloud+ subscription, enhances your privacy while browsing the web in Safari. When this feature is enabled, the traffic leaving your iPhone is encrypted and routed through two separate internet relays. This ensures that

React to this headline:

Loading spinner

How to use iCloud Private Relay for enhanced privacy Read More »

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge: The security trade-offs and how to manage them 2025-01-31 at 07:34 By Mirko Zorz Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, or even reverse-engineer

React to this headline:

Loading spinner

Deploying AI at the edge: The security trade-offs and how to manage them Read More »

Platformization is key to reduce cybersecurity complexity

Platformization is key to reduce cybersecurity complexity 2025-01-31 at 07:03 By Help Net Security Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according to a report by IBM and Palo Alto Networks. It also shows 7 out of 10 surveyed companies with a high

React to this headline:

Loading spinner

Platformization is key to reduce cybersecurity complexity Read More »

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI 2025-01-30 at 13:03 By daksh sharma Overview The rapid evolution of generative artificial intelligence (AI) has introduced both opportunities and risks in the digital landscape. While AI-generated content can enhance creativity and efficiency, it also presents significant challenges related to

React to this headline:

Loading spinner

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI Read More »

Zscaler CISO on balancing security and user convenience in hybrid work environments

Zscaler CISO on balancing security and user convenience in hybrid work environments 2025-01-30 at 07:33 By Mirko Zorz In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges it presents to cybersecurity teams. He discusses how hybrid work has exposed gaps in traditional security models

React to this headline:

Loading spinner

Zscaler CISO on balancing security and user convenience in hybrid work environments Read More »

89% of AI-powered APIs rely on insecure authentication mechanisms

89% of AI-powered APIs rely on insecure authentication mechanisms 2025-01-30 at 06:33 By Help Net Security APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API security risks, according to Wallarm. “Based on our findings, what is clear is that API security is no longer

React to this headline:

Loading spinner

89% of AI-powered APIs rely on insecure authentication mechanisms Read More »

How Lazarus Group built a cyber espionage empire

How Lazarus Group built a cyber espionage empire 2025-01-29 at 11:04 By Help Net Security Since September 2024, SecurityScorecard’s STRIKE team has been investigating Lazarus Group’s activity, uncovering key details about their infrastructure. Despite variations in payload delivery and obfuscation techniques, the campaign relied on a consistent C2 framework. Hidden control panel Through deep analysis,

React to this headline:

Loading spinner

How Lazarus Group built a cyber espionage empire Read More »

Preparing financial institutions for the next generation of cyber threats

Preparing financial institutions for the next generation of cyber threats 2025-01-29 at 07:34 By Mirko Zorz In this Help Net Security interview, James Mirfin, SVP and Head of Risk and Identity Solutions at Visa, discusses key priorities for leaders combating fraud, the next-generation threats institutions must prepare for, and the role of collaboration between financial

React to this headline:

Loading spinner

Preparing financial institutions for the next generation of cyber threats Read More »

Cybersecurity crisis in numbers

Cybersecurity crisis in numbers 2025-01-29 at 07:03 By Help Net Security The number of US data compromises in 2024 (3,158) decreased 1% compared to 2023 (3,202), 44 events away from tying a record for the number of compromises tracked in a year, according to the Identity Theft Resource Center. Data breach notices surge The number

React to this headline:

Loading spinner

Cybersecurity crisis in numbers Read More »

SEC and FCA fines: Issues jump

SEC and FCA fines: Issues jump 2025-01-29 at 06:33 By Help Net Security The financial sector faces communication compliance challenges as organizations struggle to maintain oversight across communication channels. Adding to the complexity is the unexpected rise of unconventional platforms, such as Snapchat, used for business operations. In this Help Net Security video, David Clee,

React to this headline:

Loading spinner

SEC and FCA fines: Issues jump Read More »

Only 13% of organizations fully recover data after a ransomware attack

Only 13% of organizations fully recover data after a ransomware attack 2025-01-29 at 06:04 By Help Net Security Ransomware attacks are disrupting and undermining business operations and draining revenue streams, according to Illumio. Findings from the study reveal that 58% of organizations had to shut down operations following a ransomware attack, up from 45% in

React to this headline:

Loading spinner

Only 13% of organizations fully recover data after a ransomware attack Read More »

74% of CISOs are increasing crisis simulation budgets

74% of CISOs are increasing crisis simulation budgets 2025-01-28 at 06:46 By Help Net Security In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, 23andMe, Transport for London, and Cencora, CISOs are reassessing their organisation’s readiness to manage a potential “chaos” of a full-scale cyber crisis, according to Hack The Box. Many CISOs

React to this headline:

Loading spinner

74% of CISOs are increasing crisis simulation budgets Read More »

AI security posture management will be needed before agentic AI takes hold

AI security posture management will be needed before agentic AI takes hold 2025-01-27 at 07:40 By Help Net Security As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current generative AI models such as OpenAI’s O1, the complexities of securing AI bot frameworks for enterprise

React to this headline:

Loading spinner

AI security posture management will be needed before agentic AI takes hold Read More »

Don’t let these open-source cybersecurity tools slip under your radar

Don’t let these open-source cybersecurity tools slip under your radar 2025-01-27 at 07:07 By Help Net Security This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor and detect suspicious activities across your network. Am I Isolated: Open-source container security benchmark Am I

React to this headline:

Loading spinner

Don’t let these open-source cybersecurity tools slip under your radar Read More »

Cyber trends set to influence business strategies

Cyber trends set to influence business strategies 2025-01-27 at 06:42 By Help Net Security Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, cybersecurity and data privacy, geopolitical risk, and financial fraud and abuse. In this Help Net Security

React to this headline:

Loading spinner

Cyber trends set to influence business strategies Read More »

How to use Apple’s App Privacy Report to monitor data tracking

How to use Apple’s App Privacy Report to monitor data tracking 2025-01-27 at 06:03 By Help Net Security The App Privacy Report, which Apple introduced in iOS 15.2, allows users to monitor how apps access data and interact with third-party services. The report provides an in-depth analysis of the types of sensitive data accessed by

React to this headline:

Loading spinner

How to use Apple’s App Privacy Report to monitor data tracking Read More »

Deepfakes force a new era in fraud detection, identity verification

Deepfakes force a new era in fraud detection, identity verification 2025-01-24 at 06:32 By Help Net Security The rise in identity fraud over the past two years has significantly impacted all industries, especially finance, banking, fintech, and crypto, according to Regula. With deepfakes threatening every second company around the world, businesses won’t be able to

React to this headline:

Loading spinner

Deepfakes force a new era in fraud detection, identity verification Read More »

CERT-UA Warns of Malicious AnyDesk Requests Under the Pretext of Phony “Security Audits”  

CERT-UA Warns of Malicious AnyDesk Requests Under the Pretext of Phony “Security Audits”   2025-01-23 at 15:33 By Cyble Overview  Government entities and organizations in Ukraine are on high alert after the Computer Emergency Response Team of Ukraine (CERT-UA) uncovered a social engineering campaign targeting unsuspecting users with malicious AnyDesk requests.     The attackers are impersonating

React to this headline:

Loading spinner

CERT-UA Warns of Malicious AnyDesk Requests Under the Pretext of Phony “Security Audits”   Read More »

Scroll to Top