report

Chinese military-linked companies dominate US digital supply chain

Chinese military-linked companies dominate US digital supply chain 2025-03-20 at 07:35 By Help Net Security Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military […]

React to this headline:

Loading spinner

Chinese military-linked companies dominate US digital supply chain Read More »

70% of leaked secrets remain active two years later

70% of leaked secrets remain active two years later 2025-03-20 at 07:01 By Help Net Security Long-lived plaintext credentials have been involved in most breaches over the last several years, according to GitGuardian. When valid credentials, such as API keys, passwords, and authentication tokens, leak, attackers at any skill level can gain initial access or

React to this headline:

Loading spinner

70% of leaked secrets remain active two years later Read More »

Most organizations change policies to reduce CISO liability risk

Most organizations change policies to reduce CISO liability risk 2025-03-19 at 18:15 By Help Net Security 93% of organizations made policy changes over the preceding 12 months to address concerns about increased personal liability for CISOs, according to Fastly. This includes two in five organizations (41%) increasing CISO participation in strategic decisions at the board

React to this headline:

Loading spinner

Most organizations change policies to reduce CISO liability risk Read More »

Report: The State of Secrets Sprawl 2025

Report: The State of Secrets Sprawl 2025 2025-03-19 at 16:31 By Help Net Security GitGuardian’s State of Secrets Sprawl 2025 report shows no progress in combating secrets sprawl, with 23.8 million secrets leaked on public GitHub repositories in 2024—a 25% year-over-year increase. Despite GitHub Push Protection’s efforts, secrets sprawl is accelerating, especially with generic secrets,

React to this headline:

Loading spinner

Report: The State of Secrets Sprawl 2025 Read More »

Hackers target AI and crypto as software supply chain risks grow

Hackers target AI and crypto as software supply chain risks grow 2025-03-18 at 07:47 By Help Net Security The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, according to a ReversingLabs report. According

React to this headline:

Loading spinner

Hackers target AI and crypto as software supply chain risks grow Read More »

8,000 New WordPress Vulnerabilities Reported in 2024

8,000 New WordPress Vulnerabilities Reported in 2024 2025-03-17 at 18:14 By Ionut Arghire Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes. The post 8,000 New WordPress Vulnerabilities Reported in 2024 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

8,000 New WordPress Vulnerabilities Reported in 2024 Read More »

94% of Wi-Fi networks lack protection against deauthentication attacks

94% of Wi-Fi networks lack protection against deauthentication attacks 2025-03-14 at 07:34 By Help Net Security A recent report from Nozomi Networks Labs, based on an analysis of over 500,000 wireless networks worldwide, reveals that only 6% are adequately protected against wireless deauthentication attacks. Most wireless networks, including those in mission-critical environments, remain highly exposed

React to this headline:

Loading spinner

94% of Wi-Fi networks lack protection against deauthentication attacks Read More »

Goodbye passwords? Enterprises ramping up passkey adoption

Goodbye passwords? Enterprises ramping up passkey adoption 2025-03-12 at 18:01 By Help Net Security 87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO Alliance. Key findings Enterprises understand the value of passkeys for workforce sign-ins. Most

React to this headline:

Loading spinner

Goodbye passwords? Enterprises ramping up passkey adoption Read More »

Cloud security gains overshadowed by soaring storage fees

Cloud security gains overshadowed by soaring storage fees 2025-03-07 at 17:01 By Help Net Security Storage fees in general (e.g., API calls, operations, data access) comprise 49% of an average user’s service bill, compared to the actual stored capacity, according to a study conducted by Vanson Bourne. Nearly all organizations globally have experienced data security-related

React to this headline:

Loading spinner

Cloud security gains overshadowed by soaring storage fees Read More »

89% of enterprise AI usage is invisible to the organization

89% of enterprise AI usage is invisible to the organization 2025-03-06 at 07:04 By Help Net Security Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of connections are

React to this headline:

Loading spinner

89% of enterprise AI usage is invisible to the organization Read More »

Organizations Still Not Patching OT Due to Disruption Concerns: Survey

Organizations Still Not Patching OT Due to Disruption Concerns: Survey 2025-03-05 at 21:06 By Eduard Kovacs Cyber-physical systems security company TXOne Networks has published its 2024 Annual OT/ICS Cybersecurity Report. The post Organizations Still Not Patching OT Due to Disruption Concerns: Survey appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Organizations Still Not Patching OT Due to Disruption Concerns: Survey Read More »

Online crime-as-a-service skyrockets with 24,000 users selling attack tools

Online crime-as-a-service skyrockets with 24,000 users selling attack tools 2025-03-03 at 19:01 By Help Net Security The growth of AI-based technology has introduced new challenges, making remote identity verification systems more vulnerable to attacks, according to iProov. Innovative and easily accessible tools have allowed threat actors to become more sophisticated overnight, powering an increasing number

React to this headline:

Loading spinner

Online crime-as-a-service skyrockets with 24,000 users selling attack tools Read More »

OT/ICS cyber threats escalate as geopolitical conflicts intensify

OT/ICS cyber threats escalate as geopolitical conflicts intensify 2025-02-28 at 17:03 By Help Net Security Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors

React to this headline:

Loading spinner

OT/ICS cyber threats escalate as geopolitical conflicts intensify Read More »

26 New Threat Groups Spotted in 2024: CrowdStrike

26 New Threat Groups Spotted in 2024: CrowdStrike 2025-02-27 at 21:03 By Eduard Kovacs CrowdStrike has published its 2025 Global
Threat Report, which warns of faster breakout time and an increase in Chinese activity.  The post 26 New Threat Groups Spotted in 2024: CrowdStrike appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

26 New Threat Groups Spotted in 2024: CrowdStrike Read More »

Nine Threat Groups Active in OT Operations in 2024: Dragos

Nine Threat Groups Active in OT Operations in 2024: Dragos 2025-02-25 at 15:00 By Eduard Kovacs Dragos has published its 2025 OT/ICS Cybersecurity Report, which provides information on the threats and trends observed in 2024.  The post Nine Threat Groups Active in OT Operations in 2024: Dragos appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Nine Threat Groups Active in OT Operations in 2024: Dragos Read More »

Security and privacy concerns challenge public sector’s efforts to modernize

Security and privacy concerns challenge public sector’s efforts to modernize 2025-02-21 at 18:01 By Help Net Security For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and privacy and security concerns remaining key barriers, according to a report by SolarWinds. Only 6% of respondents report

React to this headline:

Loading spinner

Security and privacy concerns challenge public sector’s efforts to modernize Read More »

300% increase in endpoint malware detections

300% increase in endpoint malware detections 2025-02-20 at 07:04 By Help Net Security The third quarter of 2024 saw a dramatic shift in the types of malware detected at network perimeters, according to a new WatchGuard report. The report’s key findings include a 300% increase quarter over quarter of endpoint malware detections, highlighted by growing

React to this headline:

Loading spinner

300% increase in endpoint malware detections Read More »

Cybercriminals shift focus to social media as attacks reach historic highs

Cybercriminals shift focus to social media as attacks reach historic highs 2025-02-18 at 18:01 By Help Net Security A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were blocked – an astonishing rate of 321 per second. The

React to this headline:

Loading spinner

Cybercriminals shift focus to social media as attacks reach historic highs Read More »

vCISOs are in high demand

vCISOs are in high demand 2025-02-14 at 19:04 By Help Net Security Regardless of job title, 92% of executives stated they had some degree of confidence in their organization’s ability to meet compliance requirements and tackle advanced threats with current staff and tools, but confidence levels differed across leadership roles, according to Cyber Defense Group.

React to this headline:

Loading spinner

vCISOs are in high demand Read More »

New GRC and cyber risk strategies emphasize risk adaptability

New GRC and cyber risk strategies emphasize risk adaptability 2025-02-14 at 18:04 By Help Net Security MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, addressing emerging risks, and seizing new opportunities. AI comes of age: risks,

React to this headline:

Loading spinner

New GRC and cyber risk strategies emphasize risk adaptability Read More »

Scroll to Top