Don’t miss

Why multi-cloud security needs a fresh approach to stay resilient

Why multi-cloud security needs a fresh approach to stay resilient 2025-03-05 at 07:41 By Mirko Zorz As enterprises expand their multi-cloud strategies to drive agility and scalability, CISOs must prioritize cyber resilience across diverse cloud platforms. The complexities of securing multi-cloud environments demand innovative solutions to maintain a strong security posture. “Many organizations in regulated […]

React to this headline:

Loading spinner

Why multi-cloud security needs a fresh approach to stay resilient Read More »

Scammers take over social media

Scammers take over social media 2025-03-05 at 07:02 By Help Net Security In Q4 2024, cyber threats reached unprecedented levels, with 2.55 billion attacks blocked, equating to 321 threats every second. In this Help Net Security video, Luis Corrons, Security Evangelist at Gen, discusses a new Gen report that highlights a troubling trend: social media

React to this headline:

Loading spinner

Scammers take over social media Read More »

Prioritizing data and identity security in 2025

Prioritizing data and identity security in 2025 2025-03-04 at 17:02 By Help Net Security To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their fingertips than ever, and data breaches have become almost a daily occurrence. For both businesses

React to this headline:

Loading spinner

Prioritizing data and identity security in 2025 Read More »

eBook: What does it take to be a full-fledged virtual CISO?

eBook: What does it take to be a full-fledged virtual CISO? 2025-03-04 at 16:00 By Help Net Security Virtual Chief Information Security Officer (vCISO) services are in high demand. Even though it is clear to all that this trend is growing, most service providers only offer a portion of overall CISO duties. Many ask themselves

React to this headline:

Loading spinner

eBook: What does it take to be a full-fledged virtual CISO? Read More »

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation 2025-03-04 at 09:23 By Mirko Zorz In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks. He underlines that adherence to frameworks like NIST is essential for continuous improvement and that data protection

React to this headline:

Loading spinner

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation Read More »

CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

CISO vs. CIO: Where security and IT leadership clash (and how to fix it) 2025-03-04 at 08:01 By Mirko Zorz The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their priorities often put them at odds. The CIO focuses on IT efficiency, innovation, and business

React to this headline:

Loading spinner

CISO vs. CIO: Where security and IT leadership clash (and how to fix it) Read More »

Why a push for encryption backdoors is a global security risk

Why a push for encryption backdoors is a global security risk 2025-03-04 at 07:36 By Help Net Security Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create a backdoor to encrypted iCloud data is just

React to this headline:

Loading spinner

Why a push for encryption backdoors is a global security risk Read More »

Innovation vs. security: Managing shadow AI risks

Innovation vs. security: Managing shadow AI risks 2025-03-03 at 18:02 By Help Net Security In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which departments, unsatisfied with

React to this headline:

Loading spinner

Innovation vs. security: Managing shadow AI risks Read More »

Commix: Open-source OS command injection exploitation tool

Commix: Open-source OS command injection exploitation tool 2025-03-03 at 08:08 By Help Net Security Commix is an open-source penetration testing tool designed to automate the detection and exploitation of command injection vulnerabilities, streamlining security assessments for researchers and ethical hackers. Commix features Easy to use: Commix simplifies the process of identifying and exploiting command injection

React to this headline:

Loading spinner

Commix: Open-source OS command injection exploitation tool Read More »

Review: The Chief AI Officer’s Handbook

Review: The Chief AI Officer’s Handbook 2025-03-03 at 07:33 By Mirko Zorz The Chief AI Officer’s Handbook is a comprehensive resource for professionals navigating AI implementation and strategy. It is particularly valuable for Chief AI Officers (CAIOs), offering guidance on defining their role and executing AI-driven business strategies. About the author Jarrod Anderson, SYRV’s Chief

React to this headline:

Loading spinner

Review: The Chief AI Officer’s Handbook Read More »

How QR code attacks work and how to protect yourself

How QR code attacks work and how to protect yourself 2025-03-03 at 07:13 By Help Net Security QR codes have become an integral part of our everyday life due to their simplicity. While they’ve been around for many years, their use exploded during the COVID-19 pandemic, when businesses turned to them for contactless menus, payments,

React to this headline:

Loading spinner

How QR code attacks work and how to protect yourself Read More »

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364) 2025-02-28 at 17:03 By Zeljka Zorz Users of the MITRE Caldera cyber security platform have been urged to plug a critical hole (CVE-2025–27364) that may allow unauthenticated attackers to achieve remote code execution. About MITRE Caldera MITRE Caldera is a platform built on the

React to this headline:

Loading spinner

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364) Read More »

OSPS Baseline: Practical security best practices for open source software projects

OSPS Baseline: Practical security best practices for open source software projects 2025-02-28 at 14:49 By Help Net Security The Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that evolve with the

React to this headline:

Loading spinner

OSPS Baseline: Practical security best practices for open source software projects Read More »

Understanding the AI Act and its compliance challenges

Understanding the AI Act and its compliance challenges 2025-02-28 at 08:03 By Mirko Zorz In this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity assessments and transparency requirements. Dumont

React to this headline:

Loading spinner

Understanding the AI Act and its compliance challenges Read More »

The art of balancing data security with business goals

The art of balancing data security with business goals 2025-02-28 at 07:32 By Help Net Security In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused on securing data,

React to this headline:

Loading spinner

The art of balancing data security with business goals Read More »

2024 phishing trends tell us what to expect in 2025

2024 phishing trends tell us what to expect in 2025 2025-02-27 at 14:18 By Zeljka Zorz Phishing has been the method most often employed by cybercriminals to achieve initial access to targeted organizations in 2024, according to risk advisory firm Kroll, which expects this trend to continue in 2025. But attackers have also increasingly been

React to this headline:

Loading spinner

2024 phishing trends tell us what to expect in 2025 Read More »

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363) 2025-02-27 at 11:32 By Zeljka Zorz A high-severity vulnerability (CVE-2025-23363) in the Siemens Teamcenter product lifecycle management (PLM) software could allow an attacker to steal users’ valid session data and gain unauthorized access to the vulnerable application. About CVE-2025-23363 Siemens Teamcenter is a suite of applications that

React to this headline:

Loading spinner

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363) Read More »

Is Agentic AI too smart for your own good?

Is Agentic AI too smart for your own good? 2025-02-27 at 08:02 By Mirko Zorz Agentic AI, which consists of systems that autonomously take action based on high-level goals, is becoming integral to enterprise security, threat intelligence, and automation. While these systems present significant potential, they also introduce new risks that CISOs must address. This

React to this headline:

Loading spinner

Is Agentic AI too smart for your own good? Read More »

Hottest cybersecurity open-source tools of the month: February 2025

Hottest cybersecurity open-source tools of the month: February 2025 2025-02-27 at 07:31 By Help Net Security This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Kunai: Open-source threat hunting tool for Linux Kunai is an open-source tool that provides deep and precise event monitoring for Linux

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: February 2025 Read More »

Debunking 5 myths about network automation

Debunking 5 myths about network automation 2025-02-27 at 06:02 By Help Net Security Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support AI adoption. Additionally, the security

React to this headline:

Loading spinner

Debunking 5 myths about network automation Read More »

Scroll to Top