report

Why CISOs should rethink identity risk through attack paths

Why CISOs should rethink identity risk through attack paths 2025-07-30 at 08:00 By Sinisa Markovic Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA […]

React to this headline:

Loading spinner

Why CISOs should rethink identity risk through attack paths Read More »

AI is here, security still isn’t

AI is here, security still isn’t 2025-07-30 at 07:30 By Sinisa Markovic Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to detect or respond to,

React to this headline:

Loading spinner

AI is here, security still isn’t Read More »

Boards shift focus to tech and navigate cautious investors

Boards shift focus to tech and navigate cautious investors 2025-07-30 at 07:00 By Anamarija Pogorelec Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer shareholder proposals (especially on sustainability),

React to this headline:

Loading spinner

Boards shift focus to tech and navigate cautious investors Read More »

Inside the application security crisis no one wants to talk about

Inside the application security crisis no one wants to talk about 2025-07-29 at 07:50 By Anamarija Pogorelec Despite knowing the risks, most organizations are still shipping insecure software. That’s one of the stark findings from Cypress Data Defense’s 2025 State of Application Security report, which reveals a worsening crisis in software security. According to the

React to this headline:

Loading spinner

Inside the application security crisis no one wants to talk about Read More »

What 50 companies got wrong about cloud identity security

What 50 companies got wrong about cloud identity security 2025-07-25 at 08:07 By Anamarija Pogorelec Most organizations still miss basic identity security controls in the cloud, leaving them exposed to breaches, audit failures, and compliance violations. A new midyear benchmark from Unosecur found that nearly every company scanned had at least one high-risk issue, with

React to this headline:

Loading spinner

What 50 companies got wrong about cloud identity security Read More »

Most data breaches have unknown causes as transparency continues to fall

Most data breaches have unknown causes as transparency continues to fall 2025-07-24 at 11:57 By Help Net Security The Identity Theft Resource Center (ITRC) reports 1,732 publicly disclosed data breaches in H1 2025, marking a 5% increase over the same period in 2024. The ITRC could track a record number of compromises in 2025 if

React to this headline:

Loading spinner

Most data breaches have unknown causes as transparency continues to fall Read More »

Your app is under attack every 3 minutes

Your app is under attack every 3 minutes 2025-07-24 at 11:57 By Help Net Security Application-layer attacks have become one of the most common and consequential methods adversaries use to gain access and compromise organizations, according to Contrast Security. These attacks target the custom code, APIs, and logic that power applications, often slipping past detection

React to this headline:

Loading spinner

Your app is under attack every 3 minutes Read More »

The fraud trends shaping 2025: Pressure builds on online retailers

The fraud trends shaping 2025: Pressure builds on online retailers 2025-07-23 at 07:12 By Anamarija Pogorelec Fraud is growing faster than revenue in eCommerce. That’s one of the first things PwC and Forter point out in their new report, and it’s a wake-up call for online retailers. Fraud is rising faster than ever Right now,

React to this headline:

Loading spinner

The fraud trends shaping 2025: Pressure builds on online retailers Read More »

Enterprise printer security fails at every stage

Enterprise printer security fails at every stage 2025-07-22 at 10:13 By Help Net Security Printer platform security is often overlooked in enterprise security strategies, creating security gaps, according to HP Wolf Security. By addressing security at every stage, organizations can strengthen their defenses and ensure their print infrastructure remains a trusted part of their IT

React to this headline:

Loading spinner

Enterprise printer security fails at every stage Read More »

Are your employees using Chinese GenAI tools at work?

Are your employees using Chinese GenAI tools at work? 2025-07-21 at 07:35 By Anamarija Pogorelec Nearly one in 12 employees are using Chinese-developed generative AI tools at work, and they’re exposing sensitive data in the process. That’s according to new research from Harmonic Security, which analyzed the behavior of roughly 14,000 end users in the

React to this headline:

Loading spinner

Are your employees using Chinese GenAI tools at work? Read More »

AI adoption is booming but secure scaling not so much

AI adoption is booming but secure scaling not so much 2025-07-18 at 09:35 By Help Net Security 96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML and intelligent apps might soon affect its operations, according to F5. Only 2% of global organizations are highly

React to this headline:

Loading spinner

AI adoption is booming but secure scaling not so much Read More »

Most cybersecurity risk comes from just 10% of employees

Most cybersecurity risk comes from just 10% of employees 2025-07-16 at 07:46 By Anamarija Pogorelec A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report analyzes

React to this headline:

Loading spinner

Most cybersecurity risk comes from just 10% of employees Read More »

DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total 

DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  2025-07-15 at 16:04 By Eduard Kovacs Cloudflare has published its quarterly DDoS threat report for Q2 2025 and the company says it has blocked millions of attacks. The post DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  appeared first on SecurityWeek.

React to this headline:

Loading spinner

DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  Read More »

Why your Microsoft 365 setup might be more vulnerable than you think

Why your Microsoft 365 setup might be more vulnerable than you think 2025-07-14 at 08:15 By Help Net Security 60% of organizations rate their Microsoft 365 security as “established” or “advanced”, according to CoreView. Yet, 60% of those same organizations have experienced account compromise attacks. The Microsoft 365 attack surface is wide and unpredictable. Risks

React to this headline:

Loading spinner

Why your Microsoft 365 setup might be more vulnerable than you think Read More »

Ransomware drops, but don’t relax yet

Ransomware drops, but don’t relax yet 2025-07-14 at 07:44 By Help Net Security WatchGuard has released its latest Internet Security Report, covering malware, network, and endpoint threats spotted by its Threat Lab in the first quarter of 2025. The report shows a 171% jump in unique malware detections compared to the previous quarter, the highest

React to this headline:

Loading spinner

Ransomware drops, but don’t relax yet Read More »

Behind the code: How developers work in 2025

Behind the code: How developers work in 2025 2025-07-11 at 13:01 By Anamarija Pogorelec How are developers working in 2025? Docker surveyed over 4,500 people to find out, and the answers are a mix of progress and ongoing pain points. AI is gaining ground but still unevenly used. Security is now baked into everyday workflows.

React to this headline:

Loading spinner

Behind the code: How developers work in 2025 Read More »

Employees are quietly bringing AI to work and leaving security behind

Employees are quietly bringing AI to work and leaving security behind 2025-07-11 at 08:06 By Help Net Security While IT departments race to implement AI governance frameworks, many employees have already opened a backdoor for AI, according to ManageEngine. The rise of unauthorized AI use Shadow AI has quietly infiltrated organizations across North America, creating

React to this headline:

Loading spinner

Employees are quietly bringing AI to work and leaving security behind Read More »

Financial firms are locking the front door but leaving the back open

Financial firms are locking the front door but leaving the back open 2025-07-11 at 07:32 By Anamarija Pogorelec Financial institutions are building stronger defenses against direct cyberattacks, but they may be overlooking a growing problem: their vendors. According to Black Kite’s new report, third-party risk has become one of the biggest cybersecurity threats facing the

React to this headline:

Loading spinner

Financial firms are locking the front door but leaving the back open Read More »

Open source has a malware problem, and it’s getting worse

Open source has a malware problem, and it’s getting worse 2025-07-10 at 08:27 By Help Net Security Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as npm and PyPI. This brings the total number of malware packages discovered by the company to 845,204.

React to this headline:

Loading spinner

Open source has a malware problem, and it’s getting worse Read More »

C-suites step up on OT cybersecurity, and it’s paying off

C-suites step up on OT cybersecurity, and it’s paying off 2025-07-10 at 07:44 By Help Net Security There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives, according to Fortinet. Growing maturity in OT cybersecurity processes and solutions (Source: Fortinet) OT security moves

React to this headline:

Loading spinner

C-suites step up on OT cybersecurity, and it’s paying off Read More »

Scroll to Top