Don’t miss

Breaking down the state of authentication

Breaking down the state of authentication 2024-01-05 at 07:02 By Help Net Security In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey revealed: – 39% indicated phishing is the most feared cyberattack, while 49% said it is the […]

React to this headline:

Loading spinner

Breaking down the state of authentication Read More »

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention 2024-01-05 at 06:32 By Help Net Security The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit weaknesses in cybersecurity defenses, seeking entry points to compromise sensitive data, disrupt critical

React to this headline:

Loading spinner

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention Read More »

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts 2024-01-04 at 07:31 By Mirko Zorz DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties. “While engaged

React to this headline:

Loading spinner

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts Read More »

15 open-source cybersecurity tools you’ll wish you’d known earlier

15 open-source cybersecurity tools you’ll wish you’d known earlier 2024-01-04 at 07:01 By Help Net Security Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency and community-driven principles, empower users with the freedom to scrutinize, modify, and adapt solutions according to their unique needs.

React to this headline:

Loading spinner

15 open-source cybersecurity tools you’ll wish you’d known earlier Read More »

The dynamic relationship between AI and application development

The dynamic relationship between AI and application development 2024-01-04 at 06:31 By Help Net Security In this Help Net Security video, Greg Ellis, General Manager, Application Security, at Digital.ai, discusses how artificial intelligence is revolutionizing the way applications are developed and redefining the possibilities within the tech industry. The post The dynamic relationship between AI

React to this headline:

Loading spinner

The dynamic relationship between AI and application development Read More »

Cybersecurity challenges emerge in the wake of API expansion

Cybersecurity challenges emerge in the wake of API expansion 2024-01-03 at 08:01 By Mirko Zorz In this Help Net Security interview, Vedran Cindric, CEO at Treblle, discusses the exponential growth of AI-related APIs, citing a 96% increase in 2023. He sheds light on the integral role APIs play in powering AI interactions, revealing the invisible

React to this headline:

Loading spinner

Cybersecurity challenges emerge in the wake of API expansion Read More »

Emerging cybersecurity trends and expectations for 2024

Emerging cybersecurity trends and expectations for 2024 2024-01-03 at 07:31 By Help Net Security In this Help Net Security video, John Dwyer, Head of Research at IBM X-Force, discusses how 2024 is poised to be an incredibly impactful year for cyber attacks, driven by world events and access to advanced technologies like AI. The post

React to this headline:

Loading spinner

Emerging cybersecurity trends and expectations for 2024 Read More »

Facts and misconceptions about cybersecurity budgets

Facts and misconceptions about cybersecurity budgets 2024-01-03 at 07:01 By Help Net Security Managing and allocating budgets for cybersecurity and IT has become an increasingly critical aspect of organizational strategy. Organizations recognize the need to invest significantly in cybersecurity to safeguard sensitive data, protect against ransomware attacks, and ensure the integrity of their IT infrastructure.

React to this headline:

Loading spinner

Facts and misconceptions about cybersecurity budgets Read More »

29 malware families target 1,800 banking apps worldwide

29 malware families target 1,800 banking apps worldwide 2024-01-03 at 06:31 By Help Net Security Mobile banking is outpacing online banking across all age groups due to its convenience and our desire to have those apps at our fingertips, according to Zimperium. However, this surge is accompanied by a dramatic growth in financial fraud. The

React to this headline:

Loading spinner

29 malware families target 1,800 banking apps worldwide Read More »

Key cybersecurity skills gap statistics you should be aware of

Key cybersecurity skills gap statistics you should be aware of 2024-01-02 at 07:31 By Help Net Security As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in the defense

React to this headline:

Loading spinner

Key cybersecurity skills gap statistics you should be aware of Read More »

Wi-Fi 7’s mission-critical role in enterprise, industrial networking

Wi-Fi 7’s mission-critical role in enterprise, industrial networking 2024-01-02 at 06:31 By Mirko Zorz As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its predecessors. In this Help Net Security interview, Tiago Rodrigues, CEO at Wireless

React to this headline:

Loading spinner

Wi-Fi 7’s mission-critical role in enterprise, industrial networking Read More »

Why you need to extend enterprise IT security to the mainframe

Why you need to extend enterprise IT security to the mainframe 2023-12-29 at 07:32 By Help Net Security Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the incompatibility of tools designed for both mainframes and enterprise settings, resulting in disparate solutions, training

React to this headline:

Loading spinner

Why you need to extend enterprise IT security to the mainframe Read More »

API security in 2024: Predictions and trends

API security in 2024: Predictions and trends 2023-12-29 at 07:02 By Help Net Security As technology continues to advance at an unprecedented pace, so does the complexity of API (application programming interface) security. With the proliferation of APIs in modern applications and services, organizations will need to develop a better understanding of their API environments

React to this headline:

Loading spinner

API security in 2024: Predictions and trends Read More »

Unveiling the true cost of healthcare cybersecurity incidents

Unveiling the true cost of healthcare cybersecurity incidents 2023-12-28 at 08:02 By Help Net Security As healthcare organizations increasingly rely on interconnected systems, electronic health records, and telemedicine, the industry becomes a prime target for malicious actors seeking to exploit vulnerabilities. The consequences of a cybersecurity breach in healthcare are not only measured in compromised

React to this headline:

Loading spinner

Unveiling the true cost of healthcare cybersecurity incidents Read More »

How to turn shadow IT into a culture of grassroots innovation

How to turn shadow IT into a culture of grassroots innovation 2023-12-28 at 07:32 By Help Net Security The proliferation of generative AI tools has been compared to the dawn of the internet, the spread of smartphones and laptops, and the mass transition to cloud computing. All these advancements make it easier for individuals to

React to this headline:

Loading spinner

How to turn shadow IT into a culture of grassroots innovation Read More »

5 pivotal cybersecurity trends for 2024

5 pivotal cybersecurity trends for 2024 2023-12-28 at 07:01 By Help Net Security In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to flourish, forcing

React to this headline:

Loading spinner

5 pivotal cybersecurity trends for 2024 Read More »

How to incorporate human-centric security

How to incorporate human-centric security 2023-12-27 at 07:32 By Help Net Security Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. However, some companies are starting to embrace

React to this headline:

Loading spinner

How to incorporate human-centric security Read More »

5 free generative AI courses you can take right now

5 free generative AI courses you can take right now 2023-12-27 at 07:01 By Help Net Security Generative AI (GenAI) is a form of artificial intelligence technology focused on generating new content. This can include text, images, audio, and other media types. It’s a rapidly evolving field with significant implications in various industries, technology, and

React to this headline:

Loading spinner

5 free generative AI courses you can take right now Read More »

Essential DDoS statistics for understanding attack impact

Essential DDoS statistics for understanding attack impact 2023-12-27 at 06:32 By Help Net Security The impact of DDoS attacks extends far beyond mere inconvenience, as they can result in financial losses, compromised data, and erosion of customer trust. Understanding the nature and consequences of DDoS activity is essential for organizations and individuals alike as they

React to this headline:

Loading spinner

Essential DDoS statistics for understanding attack impact Read More »

New insights into the global industrial cybersecurity landscape

New insights into the global industrial cybersecurity landscape 22/12/2023 at 08:31 By Help Net Security In this Help Net Security video, William Noto, VP and Industry Principal for Claroty, discusses their recent global survey of 1,100 IT and OT security professionals who work in critical infrastructure sectors. When it comes to ransomware attacks, the impact

React to this headline:

Loading spinner

New insights into the global industrial cybersecurity landscape Read More »

Scroll to Top