report

Geopolitical tensions combined with technology will drive new security risks

Geopolitical tensions combined with technology will drive new security risks 2024-01-16 at 06:02 By Help Net Security Misinformation and disinformation are biggest short-term risks, while extreme weather and critical change to Earth systems are greatest long-term concern, according to the Global Risks 2024 Report from the World Economic Forum. Against a backdrop of systemic shifts […]

React to this headline:

Loading spinner

Geopolitical tensions combined with technology will drive new security risks Read More »

APIs are increasingly becoming attractive targets

APIs are increasingly becoming attractive targets 2024-01-11 at 06:01 By Help Net Security APIs, a technology that underpins today’s most used sites and apps, are being leveraged by businesses more than ever—ultimately opening the door to more online threats than seen before, according to Cloudflare. APIs power the digital world—our phones, smartwatches, banking systems and

React to this headline:

Loading spinner

APIs are increasingly becoming attractive targets Read More »

Securing AI systems against evasion, poisoning, and abuse

Securing AI systems against evasion, poisoning, and abuse 2024-01-09 at 06:32 By Mirko Zorz Adversaries can intentionally mislead or “poison” AI systems, causing them to malfunction, and developers have yet to find an infallible defense against this. In their latest publication, NIST researchers and their partners highlight these AI and machine learning vulnerabilities. Taxonomy of

React to this headline:

Loading spinner

Securing AI systems against evasion, poisoning, and abuse Read More »

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention 2024-01-05 at 06:32 By Help Net Security The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit weaknesses in cybersecurity defenses, seeking entry points to compromise sensitive data, disrupt critical

React to this headline:

Loading spinner

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention Read More »

Budget cuts take a toll on IT decision makers’ mental health

Budget cuts take a toll on IT decision makers’ mental health 2024-01-05 at 06:01 By Help Net Security 60% of IT decision-makers agreed that budget cuts have negatively impacted their mental health and wellbeing, according to Integrity360. To add to that, 55% noted that the current economic climate has reduced access to mental health and

React to this headline:

Loading spinner

Budget cuts take a toll on IT decision makers’ mental health Read More »

15 open-source cybersecurity tools you’ll wish you’d known earlier

15 open-source cybersecurity tools you’ll wish you’d known earlier 2024-01-04 at 07:01 By Help Net Security Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency and community-driven principles, empower users with the freedom to scrutinize, modify, and adapt solutions according to their unique needs.

React to this headline:

Loading spinner

15 open-source cybersecurity tools you’ll wish you’d known earlier Read More »

Consumers prepared to ditch brands after cybersecurity issues

Consumers prepared to ditch brands after cybersecurity issues 2024-01-04 at 06:01 By Help Net Security In 2023, businesses have been hit with 800,000 cyberattacks, over 60,000 of which were DDoS attacks and 4,000 falling victim to ransomware, according to Vercara. The research found that consumers hold nuanced perceptions regarding cybersecurity incidents and are often less

React to this headline:

Loading spinner

Consumers prepared to ditch brands after cybersecurity issues Read More »

Facts and misconceptions about cybersecurity budgets

Facts and misconceptions about cybersecurity budgets 2024-01-03 at 07:01 By Help Net Security Managing and allocating budgets for cybersecurity and IT has become an increasingly critical aspect of organizational strategy. Organizations recognize the need to invest significantly in cybersecurity to safeguard sensitive data, protect against ransomware attacks, and ensure the integrity of their IT infrastructure.

React to this headline:

Loading spinner

Facts and misconceptions about cybersecurity budgets Read More »

29 malware families target 1,800 banking apps worldwide

29 malware families target 1,800 banking apps worldwide 2024-01-03 at 06:31 By Help Net Security Mobile banking is outpacing online banking across all age groups due to its convenience and our desire to have those apps at our fingertips, according to Zimperium. However, this surge is accompanied by a dramatic growth in financial fraud. The

React to this headline:

Loading spinner

29 malware families target 1,800 banking apps worldwide Read More »

Legal, compliance and privacy leaders anxious about rapid GenAI adoption

Legal, compliance and privacy leaders anxious about rapid GenAI adoption 2024-01-03 at 06:01 By Help Net Security Rapid GenAI adoption is the top-ranked issue for the next two years for legal, compliance and privacy leaders, according to Gartner. 70% of respondents reported rapid GenAI adoption as a top concern for them. “Increases in capability and

React to this headline:

Loading spinner

Legal, compliance and privacy leaders anxious about rapid GenAI adoption Read More »

Key cybersecurity skills gap statistics you should be aware of

Key cybersecurity skills gap statistics you should be aware of 2024-01-02 at 07:31 By Help Net Security As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in the defense

React to this headline:

Loading spinner

Key cybersecurity skills gap statistics you should be aware of Read More »

Hackers employ nuanced tactics to evade detection

Hackers employ nuanced tactics to evade detection 2024-01-02 at 07:01 By Help Net Security Threat actors evolved tactics, opting for a more nuanced approach that spread attacks across a broader timeframe to blend in with legitimate traffic and evade detection during peak holiday shopping times, according to Cequence Security. 2023 holiday season unveiled alarming realities

React to this headline:

Loading spinner

Hackers employ nuanced tactics to evade detection Read More »

Tech upgrades for first responders are a necessity, not a luxury

Tech upgrades for first responders are a necessity, not a luxury 2023-12-29 at 06:32 By Help Net Security Public safety professionals want technology upgrades and adoption of federal standards for first responder IT security, reporting and efficiency, according to Mark43. “We heard a resounding response from first responders across the country: They are concerned about

React to this headline:

Loading spinner

Tech upgrades for first responders are a necessity, not a luxury Read More »

AI software market to hit $307 billion by 2027

AI software market to hit $307 billion by 2027 2023-12-29 at 06:02 By Help Net Security The worldwide revenue for AI software will reach $307 billion in 2027, according to IDC. The forecast for AI-centric software includes Artificial Intelligence Platforms, AI Applications, AI System Infrastructure Software (SIS), and AI Application Development and Deployment (AD&D) software

React to this headline:

Loading spinner

AI software market to hit $307 billion by 2027 Read More »

Unveiling the true cost of healthcare cybersecurity incidents

Unveiling the true cost of healthcare cybersecurity incidents 2023-12-28 at 08:02 By Help Net Security As healthcare organizations increasingly rely on interconnected systems, electronic health records, and telemedicine, the industry becomes a prime target for malicious actors seeking to exploit vulnerabilities. The consequences of a cybersecurity breach in healthcare are not only measured in compromised

React to this headline:

Loading spinner

Unveiling the true cost of healthcare cybersecurity incidents Read More »

Security takes a backseat as CTOs and CIOs lean towards AI in 2024

Security takes a backseat as CTOs and CIOs lean towards AI in 2024 2023-12-28 at 06:31 By Help Net Security 35% of IT leaders will prioritize reducing time and resources on repetitive tasks in 2024, as 59% claim IT support is where the majority of their time is spent, according to Exclaimer. The survey results

React to this headline:

Loading spinner

Security takes a backseat as CTOs and CIOs lean towards AI in 2024 Read More »

The dawn of the autonomous enterprise is on the horizon

The dawn of the autonomous enterprise is on the horizon 2023-12-28 at 06:01 By Help Net Security 90% of IT decision-makers plan to deploy more automation, including AI, in the next 12 months, according to Digitate. IT leaders embrace AI-powered automation 26% of respondents plan to implement machine-operated tasks that require limited human input or

React to this headline:

Loading spinner

The dawn of the autonomous enterprise is on the horizon Read More »

Essential DDoS statistics for understanding attack impact

Essential DDoS statistics for understanding attack impact 2023-12-27 at 06:32 By Help Net Security The impact of DDoS attacks extends far beyond mere inconvenience, as they can result in financial losses, compromised data, and erosion of customer trust. Understanding the nature and consequences of DDoS activity is essential for organizations and individuals alike as they

React to this headline:

Loading spinner

Essential DDoS statistics for understanding attack impact Read More »

Data security and cost are key cloud adoption challenges for financial industry

Data security and cost are key cloud adoption challenges for financial industry 2023-12-27 at 06:05 By Help Net Security 91% of banks and insurance companies have now initiated their cloud journey, a significant increase from 2020, when only 37% of firms had embarked on their cloud transformations, according to Capgemini. However, this high rate and

React to this headline:

Loading spinner

Data security and cost are key cloud adoption challenges for financial industry Read More »

3 main tactics attackers use to bypass MFA

3 main tactics attackers use to bypass MFA 2023-12-26 at 07:09 By Help Net Security Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on systems protected

React to this headline:

Loading spinner

3 main tactics attackers use to bypass MFA Read More »

Scroll to Top