report

Deepfakes and voice clones are undermining election integrity

Deepfakes and voice clones are undermining election integrity 2024-07-02 at 06:02 By Help Net Security As the volume of digital business rises year over year, the potential for AI-enhanced digital fraud increases with it, according to TeleSign. A new TeleSign report highlights consumer concerns and uncertainty about how AI is being deployed, particularly regarding digital […]

React to this headline:

Loading spinner

Deepfakes and voice clones are undermining election integrity Read More »

CISOs becoming more comfortable with risk levels

CISOs becoming more comfortable with risk levels 2024-06-28 at 07:31 By Help Net Security Shifts in the cyber threats landscape have changed the way today’s CISOs evaluate their business’s risk appetite, according to Netskope. CISO risk appetite levels Specifically, 92% of CISOs report that these changes are creating tensions with their CEO and other members

React to this headline:

Loading spinner

CISOs becoming more comfortable with risk levels Read More »

Web scraping is not just a security or fraud problem

Web scraping is not just a security or fraud problem 2024-06-28 at 06:31 By Help Net Security Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations Web scraping is not just a fraud or security problem, it is also

React to this headline:

Loading spinner

Web scraping is not just a security or fraud problem Read More »

New ransomware, infostealers pose growing risk in 2024

New ransomware, infostealers pose growing risk in 2024 2024-06-27 at 07:01 By Help Net Security BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious hashes, representing a 40% increase from its previous reporting period. 60% of attacks targeting industry

React to this headline:

Loading spinner

New ransomware, infostealers pose growing risk in 2024 Read More »

75% of new vulnerabilities exploited within 19 days

75% of new vulnerabilities exploited within 19 days 2024-06-27 at 06:31 By Help Net Security Last year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes — averaging 600 new vulnerabilities per week, according to Skybox Security. The report highlights a critical gap in remediation efforts, with the

React to this headline:

Loading spinner

75% of new vulnerabilities exploited within 19 days Read More »

Developer errors lead to long-term exposure of sensitive data in Git repos

Developer errors lead to long-term exposure of sensitive data in Git repos 2024-06-26 at 15:01 By Help Net Security Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s latest research. By scanning the most popular 100 organizations on GitHub,

React to this headline:

Loading spinner

Developer errors lead to long-term exposure of sensitive data in Git repos Read More »

B+ security rating masks healthcare supply chain risks

B+ security rating masks healthcare supply chain risks 2024-06-26 at 06:01 By Help Net Security While the healthcare sector gets a “B+” security rating for the first half of 2024, it faces a critical vulnerability: supply chain cyber risk, according to SecurityScorecard. The US healthcare industry’s security ratings were better than expected, with an average

React to this headline:

Loading spinner

B+ security rating masks healthcare supply chain risks Read More »

1 out of 3 breaches go undetected

1 out of 3 breaches go undetected 2024-06-24 at 06:31 By Help Net Security Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security tools were unable to detect breaches when they occur, according to Gigamon. As hybrid cloud

React to this headline:

Loading spinner

1 out of 3 breaches go undetected Read More »

Pressure mounts on CISOs as SEC bares teeth with legal action

Pressure mounts on CISOs as SEC bares teeth with legal action 2024-06-21 at 06:31 By Help Net Security A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator that cybersecurity posture is present in a filing. This compares

React to this headline:

Loading spinner

Pressure mounts on CISOs as SEC bares teeth with legal action Read More »

Improving OT cybersecurity remains a work in progress

Improving OT cybersecurity remains a work in progress 2024-06-20 at 06:31 By Help Net Security Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network environments continue to converge, according to Fortinet. Cyberattacks that compromise OT

React to this headline:

Loading spinner

Improving OT cybersecurity remains a work in progress Read More »

Most cybersecurity pros took time off due to mental health issues

Most cybersecurity pros took time off due to mental health issues 2024-06-20 at 06:01 By Help Net Security Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing US enterprises almost $626 million in lost productivity every year, according to Hack The

React to this headline:

Loading spinner

Most cybersecurity pros took time off due to mental health issues Read More »

Find out which cybersecurity threats organizations fear the most

Find out which cybersecurity threats organizations fear the most 2024-06-19 at 06:31 By Help Net Security This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance isn’t the answer for ransom payments Veeam | 2024 Ransomware Trends Report | June 2024 Ransomware remains

React to this headline:

Loading spinner

Find out which cybersecurity threats organizations fear the most Read More »

Rising exploitation in enterprise software: Key trends for CISOs

Rising exploitation in enterprise software: Key trends for CISOs 2024-06-19 at 06:01 By Help Net Security Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common Vulnerabilities and Exposures (CVE) identifiers with CPE (Common Platform Enumeration) data, our report comes at

React to this headline:

Loading spinner

Rising exploitation in enterprise software: Key trends for CISOs Read More »

Mass exploitation is the new primary attack vector for ransomware

Mass exploitation is the new primary attack vector for ransomware 2024-06-18 at 07:01 By Help Net Security The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and infrastructure Common Vulnerabilities and Exposures (CVEs) in the Known Exploited

React to this headline:

Loading spinner

Mass exploitation is the new primary attack vector for ransomware Read More »

42% plan to use API security for AI data protection

42% plan to use API security for AI data protection 2024-06-18 at 06:01 By Help Net Security While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems companies put in place to obtain, store, and secure it are

React to this headline:

Loading spinner

42% plan to use API security for AI data protection Read More »

Malicious emails trick consumers into false election contributions

Malicious emails trick consumers into false election contributions 2024-06-17 at 06:32 By Help Net Security Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according to Trellix. “The last six months have been unprecedented – a state of polycrisis remains and

React to this headline:

Loading spinner

Malicious emails trick consumers into false election contributions Read More »

The biggest downsides of digital ID adoption

The biggest downsides of digital ID adoption 2024-06-14 at 07:01 By Help Net Security As innovative digital verification methods continue to emerge, the debate around their reliability and effectiveness is heating up, according to Regula. Companies employ various methods for identity verification Despite digital advances, many organizations worldwide still depend on physical documents for verification.

React to this headline:

Loading spinner

The biggest downsides of digital ID adoption Read More »

GenAI keeps cybersecurity pros on high alert

GenAI keeps cybersecurity pros on high alert 2024-06-13 at 06:01 By Help Net Security “Businesses across every industry face unprecedented challenges posed by an increasing attack surface, zero-day vulnerabilities, cloud misconfigurations, and new emerging threats driven by AI,” said Andrei Florescu, president and GM of Bitdefender Business Solutions Group. “The findings of our recent survey

React to this headline:

Loading spinner

GenAI keeps cybersecurity pros on high alert Read More »

Preparing for a career in cybersecurity? Check out these statistics

Preparing for a career in cybersecurity? Check out these statistics 2024-06-11 at 07:01 By Help Net Security This article includes excerpts from various reports that provide statistics and insights on cybersecurity jobs, skills shortages, and workforce dynamics. Lack of skills and budget slow zero-trust implementation Entrust | 2024 State of Zero Trust & Encryption Study

React to this headline:

Loading spinner

Preparing for a career in cybersecurity? Check out these statistics Read More »

Security providers view compliance as a high-growth opportunity

Security providers view compliance as a high-growth opportunity 2024-06-11 at 06:01 By Help Net Security 85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega. That being said, the survey also

React to this headline:

Loading spinner

Security providers view compliance as a high-growth opportunity Read More »

Scroll to Top