report

AI agents have access to key data across the enterprise

AI agents have access to key data across the enterprise 2025-05-30 at 08:14 By Help Net Security 82% of organizations already use AI agents, but only 44% of organizations report having policies in place to secure them, according to SailPoint. While 53% are in the process of developing such policies, the reality is that most […]

React to this headline:

Loading spinner

AI agents have access to key data across the enterprise Read More »

How CISOs can regain ground in the AI fraud war

How CISOs can regain ground in the AI fraud war 2025-05-29 at 08:31 By Help Net Security Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor. Their 2025 Fraud & AML Executive Report, based on surveys of banks, fintechs, credit unions, and digital

React to this headline:

Loading spinner

How CISOs can regain ground in the AI fraud war Read More »

CISOs prioritize AI-driven automation to optimize cybersecurity spending

CISOs prioritize AI-driven automation to optimize cybersecurity spending 2025-05-29 at 08:04 By Help Net Security Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are investing in AI automation to enhance their cybersecurity operations. AI-driven automation can help in detecting and responding to threats

React to this headline:

Loading spinner

CISOs prioritize AI-driven automation to optimize cybersecurity spending Read More »

GitHub becomes go-to platform for malware delivery across Europe

GitHub becomes go-to platform for malware delivery across Europe 2025-05-28 at 07:32 By Help Net Security Phishing has become the go-to method for attackers looking to get past security controls and access sensitive environments in Europe, according to Netskope. Users are now constantly dealing with phishing attempts, which have become so common and credible that

React to this headline:

Loading spinner

GitHub becomes go-to platform for malware delivery across Europe Read More »

4.5% of breaches now extend to fourth parties

4.5% of breaches now extend to fourth parties 2025-05-27 at 07:32 By Help Net Security Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk assessments, conducted annually or quarterly, are too slow to detect active threats. 35.5% of all breaches in 2024 were third-party

React to this headline:

Loading spinner

4.5% of breaches now extend to fourth parties Read More »

AI forces security leaders to rethink hybrid cloud strategies

AI forces security leaders to rethink hybrid cloud strategies 2025-05-26 at 07:01 By Help Net Security Hybrid cloud infrastructure is under mounting strain from the growing influence of AI, according to Gigamon. Cyberthreats grow in scale and sophistication As cyberthreats increase in both scale and sophistication, breach rates have surged to 55% during the past

React to this headline:

Loading spinner

AI forces security leaders to rethink hybrid cloud strategies Read More »

Digital trust is cracking under the pressure of deepfakes, cybercrime

Digital trust is cracking under the pressure of deepfakes, cybercrime 2025-05-23 at 08:02 By Help Net Security 69% of global respondents to a Jumio survey say AI-powered fraud now poses a greater threat to personal security than traditional forms of identity theft. This number rises to 74% in Singapore, with 71% also indicating that AI-generated

React to this headline:

Loading spinner

Digital trust is cracking under the pressure of deepfakes, cybercrime Read More »

Shift left strategy creates heavy burden for developers

Shift left strategy creates heavy burden for developers 2025-05-23 at 07:32 By Help Net Security While 47% of organizations claim to have implemented shift left security strategies, many still struggle with execution gaps and security inefficiencies, according to Pynt. Of those who haven’t implemented shift left, half of them have no plans to do so

React to this headline:

Loading spinner

Shift left strategy creates heavy burden for developers Read More »

CTM360 report: Ransomware exploits trust more than tech

CTM360 report: Ransomware exploits trust more than tech 2025-05-22 at 08:35 By Anamarija Pogorelec A recent wave of ransomware attacks has disrupted major retailers across the UK. According to a new report from CTM360, the attackers didn’t need to break down the door, they were invited in through misplaced trust and weak identity safeguards. This

React to this headline:

Loading spinner

CTM360 report: Ransomware exploits trust more than tech Read More »

Many rush into GenAI deployments, frequently without a security net

Many rush into GenAI deployments, frequently without a security net 2025-05-22 at 08:03 By Help Net Security 70% percent of organizations view the pace of AI development, particularly in GenAI, as the leading security concern related to its adoption, followed by lack of data integrity (64%) and trustworthiness (57%), according to Thales. GenAI becomes a

React to this headline:

Loading spinner

Many rush into GenAI deployments, frequently without a security net Read More »

Nation-state APTs ramp up attacks on Ukraine and the EU

Nation-state APTs ramp up attacks on Ukraine and the EU 2025-05-21 at 07:02 By Help Net Security Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new

React to this headline:

Loading spinner

Nation-state APTs ramp up attacks on Ukraine and the EU Read More »

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide 2025-05-19 at 16:50 By Anamarija Pogorelec A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360. The campaign uses fake Google ads, advanced filtering techniques, to steal sensitive login credentials and bypass MFA. Researchers uncovered

React to this headline:

Loading spinner

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide Read More »

Polymorphic phishing attacks flood inboxes

Polymorphic phishing attacks flood inboxes 2025-05-16 at 08:31 By Help Net Security AI is transforming the phishing threat landscape at a pace many security teams are struggling to match, according to Cofense. In 2024, researchers tracked one malicious email every 42 seconds. Many of the 42-second attacks were part of polymorphic phishing attacks. Unlike traditional

React to this headline:

Loading spinner

Polymorphic phishing attacks flood inboxes Read More »

Ransomware spreads faster, not smarter

Ransomware spreads faster, not smarter 2025-05-14 at 07:00 By Help Net Security The fall of two of the most dominant ransomware syndicates, LockBit and AlphV, triggered a power vacuum across the cybercriminal landscape, acccording to a Black Kite survey. In their place, dozens of new actors emerged, many of them lacking the infrastructure, discipline, or

React to this headline:

Loading spinner

Ransomware spreads faster, not smarter Read More »

Despite drop in cyber claims, BEC keeps going strong

Despite drop in cyber claims, BEC keeps going strong 2025-05-12 at 07:01 By Help Net Security Ransomware claims stabilized in 2024 despite remaining the most costly and disruptive type of cyberattack, according to Coalition. 60% of 2024 claims originated from BEC and funds transfer fraud (FTF) incidents, with 29% of BEC events resulting in FTF.

React to this headline:

Loading spinner

Despite drop in cyber claims, BEC keeps going strong Read More »

What your browser knows about you, from contacts to card numbers

What your browser knows about you, from contacts to card numbers 2025-05-09 at 13:06 By Anamarija Pogorelec Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data. Chrome: the most data-hungry browser (Source: Surfshark) The most data-hungry browsers

React to this headline:

Loading spinner

What your browser knows about you, from contacts to card numbers Read More »

Global cybersecurity readiness remains critically low

Global cybersecurity readiness remains critically low 2025-05-08 at 07:34 By Help Net Security Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 Cybersecurity Readiness Index. This is a slight increase from last year’s index, in which 3% of organizations worldwide were designated as

React to this headline:

Loading spinner

Global cybersecurity readiness remains critically low Read More »

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts 2025-05-08 at 07:02 By Help Net Security Healthcare organizations are facing a growing data security challenge from within, according to a new report from Netskope Threat Labs. The analysis reveals that employees in the sector are frequently attempting to upload sensitive information, including potentially protected

React to this headline:

Loading spinner

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts Read More »

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable 2025-05-07 at 09:46 By Mirko Zorz A new report from bot defense firm Kasada has exposed the growing threat of ALTSRUS, a fraud syndicate targeting some of the most vulnerable corners of the digital economy. Researchers revealed how the group has scaled its operations to steal

React to this headline:

Loading spinner

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable Read More »

Personal data of top executives easily found online

Personal data of top executives easily found online 2025-05-07 at 07:01 By Help Net Security The personal information of 75% of corporate directors can be found on people search sites, according to Incogni. People search sites claim to reveal a variety of personal details, including public records, phone numbers, and even property values. Home addresses

React to this headline:

Loading spinner

Personal data of top executives easily found online Read More »

Scroll to Top