News

Smart steps to keep your AI future-ready

Smart steps to keep your AI future-ready 2025-08-01 at 09:36 By Mirko Zorz In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong governance from day one. As AI becomes more embedded in business ecosystems, overlooking agent-level security can […]

React to this headline:

Loading spinner

Smart steps to keep your AI future-ready Read More »

It’s time to sound the alarm on water sector cybersecurity

It’s time to sound the alarm on water sector cybersecurity 2025-08-01 at 09:07 By Sinisa Markovic A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean water supply can have serious public health and safety consequences, and threat actors know the damage they can cause.

React to this headline:

Loading spinner

It’s time to sound the alarm on water sector cybersecurity Read More »

What attackers know about your company thanks to AI

What attackers know about your company thanks to AI 2025-08-01 at 08:48 By Help Net Security In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key areas: how GenAI lowers the technical barrier for attackers, enables highly

React to this headline:

Loading spinner

What attackers know about your company thanks to AI Read More »

Review: CISA Certified Information Systems Auditor Practice Tests

Review: CISA Certified Information Systems Auditor Practice Tests 2025-08-01 at 08:02 By Mirko Zorz CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering key objectives and real-world systems audit skills. About the authors Peter H. Gregory is a best-selling cybersecurity author, educator, keynote speaker,

React to this headline:

Loading spinner

Review: CISA Certified Information Systems Auditor Practice Tests Read More »

Security gaps still haunt shared mobile device use in healthcare

Security gaps still haunt shared mobile device use in healthcare 2025-08-01 at 07:33 By Sinisa Markovic Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still struggling to manage the security risks that come with them, according to Imprivata’s 2025 State

React to this headline:

Loading spinner

Security gaps still haunt shared mobile device use in healthcare Read More »

Infosec products of the month: July 2025

Infosec products of the month: July 2025 2025-08-01 at 07:03 By Sinisa Markovic Here’s a look at the most interesting products from the past month, featuring releases from: Akeyless, At-Bay, Barracuda Networks, Bitdefender, Cynomi, Darwinium, DigitalOcean, Immersive, Lepide, Malwarebytes, ManageEngine, NETSCOUT, PlexTrac, Scamnetic, Seemplicity, Socure, StealthCores, Stellar Cyber, Tosibox, Tracer AI, and Zenni Optical. Darwinium

React to this headline:

Loading spinner

Infosec products of the month: July 2025 Read More »

Why stolen credentials remain cybercriminals’ tool of choice

Why stolen credentials remain cybercriminals’ tool of choice 2025-07-31 at 09:26 By Help Net Security It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It

React to this headline:

Loading spinner

Why stolen credentials remain cybercriminals’ tool of choice Read More »

New AI model offers faster, greener way for vulnerability detection

New AI model offers faster, greener way for vulnerability detection 2025-07-31 at 08:33 By Mirko Zorz A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much larger systems. The model’s release comes at a time when developers and security teams face mounting pressure to secure

React to this headline:

Loading spinner

New AI model offers faster, greener way for vulnerability detection Read More »

AI is changing the vCISO game

AI is changing the vCISO game 2025-07-31 at 08:02 By Anamarija Pogorelec Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and MSSPs now offer

React to this headline:

Loading spinner

AI is changing the vCISO game Read More »

Secrets are leaking everywhere, and bots are to blame

Secrets are leaking everywhere, and bots are to blame 2025-07-31 at 07:30 By Anamarija Pogorelec Secrets like API keys, tokens, and credentials are scattered across messaging apps, spreadsheets, CI/CD logs, and even support tickets. According to Entro Security’s NHI & Secrets Risk Report H1 2025, non-human identities (NHIs), including bots, service accounts, and automation tools,

React to this headline:

Loading spinner

Secrets are leaking everywhere, and bots are to blame Read More »

Why rural hospitals are losing the cybersecurity battle

Why rural hospitals are losing the cybersecurity battle 2025-07-31 at 07:04 By Anamarija Pogorelec Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. Often, they are left

React to this headline:

Loading spinner

Why rural hospitals are losing the cybersecurity battle Read More »

Artemis: Open-source modular vulnerability scanner

Artemis: Open-source modular vulnerability scanner 2025-07-30 at 09:00 By Mirko Zorz Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most important feature of the tool is report generation. Besides scanning, it

React to this headline:

Loading spinner

Artemis: Open-source modular vulnerability scanner Read More »

The food supply chain has a cybersecurity problem

The food supply chain has a cybersecurity problem 2025-07-30 at 08:30 By Sinisa Markovic It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity in

React to this headline:

Loading spinner

The food supply chain has a cybersecurity problem Read More »

Why CISOs should rethink identity risk through attack paths

Why CISOs should rethink identity risk through attack paths 2025-07-30 at 08:00 By Sinisa Markovic Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA

React to this headline:

Loading spinner

Why CISOs should rethink identity risk through attack paths Read More »

AI is here, security still isn’t

AI is here, security still isn’t 2025-07-30 at 07:30 By Sinisa Markovic Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to detect or respond to,

React to this headline:

Loading spinner

AI is here, security still isn’t Read More »

Boards shift focus to tech and navigate cautious investors

Boards shift focus to tech and navigate cautious investors 2025-07-30 at 07:00 By Anamarija Pogorelec Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer shareholder proposals (especially on sustainability),

React to this headline:

Loading spinner

Boards shift focus to tech and navigate cautious investors Read More »

Fighting AI with AI: How Darwinium is reshaping fraud defense

Fighting AI with AI: How Darwinium is reshaping fraud defense 2025-07-29 at 16:07 By Mirko Zorz AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered

React to this headline:

Loading spinner

Fighting AI with AI: How Darwinium is reshaping fraud defense Read More »

Beyond Passwords: A Guide to Advanced Enterprise Security Protection

Beyond Passwords: A Guide to Advanced Enterprise Security Protection 2025-07-29 at 15:00 By Help Net Security Credentials, not firewalls, are now the front line of enterprise security. Attackers are bypassing traditional defenses using stolen passwords, infostealer malware, and MFA fatigue tactics. Enzoic’s Beyond Passwords guide shows how to shift to identity-first protection with real-time credential

React to this headline:

Loading spinner

Beyond Passwords: A Guide to Advanced Enterprise Security Protection Read More »

Why behavioral intelligence is becoming the bank fraud team’s best friend

Why behavioral intelligence is becoming the bank fraud team’s best friend 2025-07-29 at 09:03 By Mirko Zorz In this Help Net Security interview, Seth Ruden, Senior Director of Global Advisory at BioCatch, discusses how financial institutions are addressing fraud. He explains how banks are using behavioral biometrics, device fingerprinting, and network intelligence to enhance fraud

React to this headline:

Loading spinner

Why behavioral intelligence is becoming the bank fraud team’s best friend Read More »

Ransomware will thrive until we change our strategy

Ransomware will thrive until we change our strategy 2025-07-29 at 08:36 By Help Net Security We have reached a stage where ransomware isn’t simply a cybercrime issue: it is now clearly a business disruptor, a threat to societal trust, and increasingly, a national security crisis. As James Babbage, Director General (Threats) at the UK’s National

React to this headline:

Loading spinner

Ransomware will thrive until we change our strategy Read More »

Scroll to Top