report

1% of users are responsible for 88% of data loss events

1% of users are responsible for 88% of data loss events 2024-03-20 at 07:01 By Help Net Security Data loss is a problem stemming from the interaction between humans and machines, and ‘careless users’ are much more likely to cause those incidents than compromised or misconfigured systems, according to Proofpoint. While organizations are investing in […]

React to this headline:

Loading spinner

1% of users are responsible for 88% of data loss events Read More »

API environments becoming hotspots for exploitation

API environments becoming hotspots for exploitation 2024-03-20 at 06:01 By Help Net Security A total of 29% of web attacks targeted APIs over 12 months (January through December 2023), indicating that APIs are a focus area for cybercriminals, according to Akamai. API integration amplifies risk exposure for enterprises APIs are at the heart of digital

React to this headline:

Loading spinner

API environments becoming hotspots for exploitation Read More »

Public anxiety mounts over critical infrastructure resilience to cyber attacks

Public anxiety mounts over critical infrastructure resilience to cyber attacks 2024-03-18 at 12:01 By Help Net Security With temporary failures of critical infrastructure on the rise in the recent years, 81% of US residents are worried about how secure critical infrastructure may be, according to MITRE and The Harris Poll. Public views cyberattacks as greatest

React to this headline:

Loading spinner

Public anxiety mounts over critical infrastructure resilience to cyber attacks Read More »

Key MITRE ATT&CK techniques used by cyber attackers

Key MITRE ATT&CK techniques used by cyber attackers 2024-03-15 at 11:01 By Help Net Security While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&CK techniques that adversaries abuse

React to this headline:

Loading spinner

Key MITRE ATT&CK techniques used by cyber attackers Read More »

90% of exposed secrets on GitHub remain active for at least five days

90% of exposed secrets on GitHub remain active for at least five days 2024-03-15 at 07:30 By Help Net Security 12.8 million new secrets occurrences were leaked publicly on GitHub in 2023, +28% compared to 2022, according to GitGuardian. Remarkably, the incidence of publicly exposed secrets has quadrupled since the company started reporting in 2021.

React to this headline:

Loading spinner

90% of exposed secrets on GitHub remain active for at least five days Read More »

Human risk factors remain outside of cybersecurity pros’ control

Human risk factors remain outside of cybersecurity pros’ control 2024-03-15 at 07:00 By Help Net Security Cyber threats are growing at an unprecedented pace, and the year ahead is fraught with cybercrime and incidents anticipated ahead of the busy election year where over 50 countries head to the polls, according to Mimecast. With new threats

React to this headline:

Loading spinner

Human risk factors remain outside of cybersecurity pros’ control Read More »

Only 13% of medical devices support endpoint protection agents

Only 13% of medical devices support endpoint protection agents 2024-03-14 at 07:00 By Help Net Security 63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, and surgery devices—have at least one known exploited vulnerability, according to Claroty. Traditionally, medical devices have

React to this headline:

Loading spinner

Only 13% of medical devices support endpoint protection agents Read More »

IT leaders think immutable data storage is an insurance policy against ransomware

IT leaders think immutable data storage is an insurance policy against ransomware 2024-03-14 at 06:00 By Help Net Security IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now understood by organizations to be inevitable. Reports show 1 in 4 organizations that pay a ransom

React to this headline:

Loading spinner

IT leaders think immutable data storage is an insurance policy against ransomware Read More »

Keyloggers, spyware, and stealers dominate SMB malware detections

Keyloggers, spyware, and stealers dominate SMB malware detections 2024-03-13 at 06:06 By Help Net Security In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this stolen information to gain unauthorized remote access, extort victims, deploy ransomware,

React to this headline:

Loading spinner

Keyloggers, spyware, and stealers dominate SMB malware detections Read More »

Image-based phishing tactics evolve

Image-based phishing tactics evolve 2024-03-12 at 06:00 By Help Net Security While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of emerging types of phishing attacks

React to this headline:

Loading spinner

Image-based phishing tactics evolve Read More »

Advanced AI, analytics, and automation are vital to tackle tech stack complexity

Advanced AI, analytics, and automation are vital to tackle tech stack complexity 2024-03-11 at 06:32 By Help Net Security 97% of technology leaders find traditional AIOps models are unable to tackle the data overload, according to Dynatrace. Organizations are drowning in data The research reveals that organizations are continuing to embrace multi-cloud environments and cloud-native

React to this headline:

Loading spinner

Advanced AI, analytics, and automation are vital to tackle tech stack complexity Read More »

How new and old security threats keep persisting

How new and old security threats keep persisting 2024-03-08 at 08:00 By Help Net Security Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Security leaders take proactive approach to cybersecurity Rather than waiting for the next big cyberattack and

React to this headline:

Loading spinner

How new and old security threats keep persisting Read More »

Today’s biggest AI security challenges

Today’s biggest AI security challenges 2024-03-07 at 08:23 By Help Net Security 98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to HiddenLayer. The report surveyed 150 IT security and data science leaders to shed

React to this headline:

Loading spinner

Today’s biggest AI security challenges Read More »

78% of MSPs identify cybersecurity as prime IT challenge

78% of MSPs identify cybersecurity as prime IT challenge 2024-03-07 at 06:46 By Help Net Security Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing cyberattack threats impact MSPs The threat of cyberattacks continues to weigh on

React to this headline:

Loading spinner

78% of MSPs identify cybersecurity as prime IT challenge Read More »

AI tools put companies at risk of data exfiltration

AI tools put companies at risk of data exfiltration 2024-03-06 at 06:03 By Help Net Security Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating swift action is needed, according to Code42. Since 2021, there has been

React to this headline:

Loading spinner

AI tools put companies at risk of data exfiltration Read More »

Organizations are knowingly releasing vulnerable applications

Organizations are knowingly releasing vulnerable applications 2024-03-05 at 06:18 By Help Net Security 92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for application security has shifted away from dedicated

React to this headline:

Loading spinner

Organizations are knowingly releasing vulnerable applications Read More »

95% believe LLMs making phishing detection more challenging

95% believe LLMs making phishing detection more challenging 2024-03-04 at 07:32 By Help Net Security More than 95% of responding IT and security professionals believe social engineering attacks have become more sophisticated in the last year, according to LastPass. Recent AI advancements, particularly generative AI, have empowered cybercriminals to coordinate social engineering assaults with unprecedented

React to this headline:

Loading spinner

95% believe LLMs making phishing detection more challenging Read More »

New compensation trends in the cybersecurity sector

New compensation trends in the cybersecurity sector 2024-03-04 at 06:31 By Help Net Security For several years, cybersecurity leaders have grappled with talent shortages in crucial cyber roles. In the face of escalating financial requirements and expanding responsibilities, these leaders are under heightened pressure to achieve more with fewer resources, creating roles encompassing multiple security

React to this headline:

Loading spinner

New compensation trends in the cybersecurity sector Read More »

Cybercriminals harness AI for new era of malware development

Cybercriminals harness AI for new era of malware development 2024-03-01 at 08:31 By Help Net Security The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase in the number of companies that had their data uploaded on dedicated leak sites

React to this headline:

Loading spinner

Cybercriminals harness AI for new era of malware development Read More »

Businesses foresee major impact from new SEC cybersecurity disclosure rules

Businesses foresee major impact from new SEC cybersecurity disclosure rules 2024-03-01 at 07:04 By Help Net Security While 98% of security professionals and executives have started working to comply with the new U.S. Securities and Exchange Commission (SEC) cybersecurity disclosure ruling, over one-third are still in the early phases of their efforts, according to AuditBoard.

React to this headline:

Loading spinner

Businesses foresee major impact from new SEC cybersecurity disclosure rules Read More »

Scroll to Top