report

RSA Conference 2025 Announcement Summary (Day 3) 

RSA Conference 2025 Announcement Summary (Day 3)  2025-05-02 at 13:05 By SecurityWeek News Hundreds of companies showcased their products and services this week at the 2025 edition of the RSA Conference in San Francisco. The post RSA Conference 2025 Announcement Summary (Day 3)  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View […]

React to this headline:

Loading spinner

RSA Conference 2025 Announcement Summary (Day 3)  Read More »

AI and automation shift the cybersecurity balance toward attackers

AI and automation shift the cybersecurity balance toward attackers 2025-05-02 at 09:02 By Help Net Security Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security.

React to this headline:

Loading spinner

AI and automation shift the cybersecurity balance toward attackers Read More »

People know password reuse is risky but keep doing it anyway

People know password reuse is risky but keep doing it anyway 2025-05-02 at 08:16 By Help Net Security 35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of

React to this headline:

Loading spinner

People know password reuse is risky but keep doing it anyway Read More »

Half of red flags in third-party deals never reach compliance teams

Half of red flags in third-party deals never reach compliance teams 2025-05-02 at 07:32 By Help Net Security Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance teams reliably, according to Gartner. The post Half of red flags in

React to this headline:

Loading spinner

Half of red flags in third-party deals never reach compliance teams Read More »

Preparing for the next wave of machine identity growth

Preparing for the next wave of machine identity growth 2025-05-01 at 09:21 By Mirko Zorz Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how automation can help, and

React to this headline:

Loading spinner

Preparing for the next wave of machine identity growth Read More »

Online fraud peaks as breaches rise

Online fraud peaks as breaches rise 2025-05-01 at 07:31 By Help Net Security Data breaches played a key role in significant financial losses faced by consumers due to fraud. In this Help Net Security video, Steve Yin, Global Head of Fraud at TransUnion, and Brad Daughdrill, VP, Data Science, Head of Global Fraud Analytics, TransUnion,

React to this headline:

Loading spinner

Online fraud peaks as breaches rise Read More »

Low-tech phishing attacks are gaining ground

Low-tech phishing attacks are gaining ground 2025-05-01 at 07:02 By Help Net Security Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based on an analysis of global real-world data and highlights the most significant email security trends from the first quarter of 2025. Callback

React to this headline:

Loading spinner

Low-tech phishing attacks are gaining ground Read More »

Mobile security is a frontline risk. Are you ready?

Mobile security is a frontline risk. Are you ready? 2025-04-30 at 08:33 By Help Net Security The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the primary attack surfaces.

React to this headline:

Loading spinner

Mobile security is a frontline risk. Are you ready? Read More »

Why cyber resilience must be part of every organization’s DNA

Why cyber resilience must be part of every organization’s DNA 2025-04-30 at 07:05 By Help Net Security As AI brings about excitement and transformative potential, the report reveals that organizations are forging ahead with innovations despite increased security concerns, according to LevelBlue’s 2025 Futures Report. In fact, just 29% of executives surveyed say they are

React to this headline:

Loading spinner

Why cyber resilience must be part of every organization’s DNA Read More »

44% of the zero-days exploited in 2024 were in enterprise solutions

44% of the zero-days exploited in 2024 were in enterprise solutions 2025-04-29 at 21:18 By Zeljka Zorz In 2024, threat actors exploited 75 zero-days – i.e., vulnerabilities previously unknown to vendors, thus without a readily available patch – in a wide variety of attacks. Of these, 33 vulnerabilities (44%) affected enterprise solutions, which is up

React to this headline:

Loading spinner

44% of the zero-days exploited in 2024 were in enterprise solutions Read More »

Google Tracked 75 Zero-Days in 2024

Google Tracked 75 Zero-Days in 2024 2025-04-29 at 14:42 By Eduard Kovacs The number of exploited zero-days seen by Google in 2024 dropped to 75, from 98 observed in the previous year. The post Google Tracked 75 Zero-Days in 2024 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Google Tracked 75 Zero-Days in 2024 Read More »

Investing in security? It’s not helping you fix what matters faster

Investing in security? It’s not helping you fix what matters faster 2025-04-29 at 07:30 By Help Net Security Automation and structured collaboration have a strong, positive influence on the efficiency of vulnerability management, according to Seemplicity. However, manual processes, unstructured workflows, and excessive noise from vulnerability scanning tools continue to slow remediation efforts, leading to

React to this headline:

Loading spinner

Investing in security? It’s not helping you fix what matters faster Read More »

Ransomware attacks are getting smarter, harder to stop

Ransomware attacks are getting smarter, harder to stop 2025-04-28 at 07:36 By Help Net Security Ransomware attacks are becoming more refined and pervasive, posing significant challenges to organizations globally. A Veeam report reveals that while the percentage of companies impacted by ransomware attacks has slightly declined from 75% to 69%, the threat remains substantial. This

React to this headline:

Loading spinner

Ransomware attacks are getting smarter, harder to stop Read More »

Most critical vulnerabilities aren’t worth your attention

Most critical vulnerabilities aren’t worth your attention 2025-04-28 at 07:03 By Help Net Security Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still contain at least one vulnerability By analyzing

React to this headline:

Loading spinner

Most critical vulnerabilities aren’t worth your attention Read More »

M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat

M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat 2025-04-25 at 16:32 By Kevin Townsend Mandiant’s latest threat report shows how attackers adapt faster than defenses, shifting strategies toward credential theft and insider threats. The post M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat Read More »

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy 2025-04-25 at 15:53 By Danelle Au With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise. The post Inside the Verizon 2025 DBIR: Five Trends That

React to this headline:

Loading spinner

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy Read More »

Flexible working models fuel surge in device theft

Flexible working models fuel surge in device theft 2025-04-25 at 08:34 By Help Net Security 76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of organizations with flexible

React to this headline:

Loading spinner

Flexible working models fuel surge in device theft Read More »

Exposure validation emerges as critical cyber defense component

Exposure validation emerges as critical cyber defense component 2025-04-25 at 08:13 By Help Net Security Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to Cymulate. At the same time, nearly all respondents say

React to this headline:

Loading spinner

Exposure validation emerges as critical cyber defense component Read More »

FBI: Cybercrime Losses Surpassed $16.6 Billion in 2024

FBI: Cybercrime Losses Surpassed $16.6 Billion in 2024 2025-04-24 at 13:19 By Ionut Arghire The FBI received roughly 860,000 complaints of malicious activity in 2024, with reported losses exceeding $16.6 billion. The post FBI: Cybercrime Losses Surpassed $16.6 Billion in 2024 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

FBI: Cybercrime Losses Surpassed $16.6 Billion in 2024 Read More »

A new era of cyber threats is approaching for the energy sector

A new era of cyber threats is approaching for the energy sector 2025-04-24 at 08:17 By Sinisa Markovic Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful attack can be severe, potentially

React to this headline:

Loading spinner

A new era of cyber threats is approaching for the energy sector Read More »

Scroll to Top