report

Healthcare organizations are at a turning point with AI

Healthcare organizations are at a turning point with AI 2025-06-05 at 07:01 By Help Net Security 32% of healthcare executives say their organization suffered a breach in the past 12 months, and 46% say they are experiencing a higher volume of attacks, according to LevelBlue. AI brings hope and concern As AI promises healthcare organizations […]

React to this headline:

Loading spinner

Healthcare organizations are at a turning point with AI Read More »

Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift

Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift 2025-06-04 at 14:17 By Eduard Kovacs Industrial giant Honeywell has published its 2025 Cybersecurity Threat Report with information on the latest trends. The post Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Read More »

CISOs need better tools to turn risk into action

CISOs need better tools to turn risk into action 2025-06-04 at 07:01 By Help Net Security Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to a new Ivanti report. The “Exposure Management: From Subjective to Objective Cybersecurity” report points out that as companies keep

React to this headline:

Loading spinner

CISOs need better tools to turn risk into action Read More »

48% of security pros are falling behind compliance requirements

48% of security pros are falling behind compliance requirements 2025-06-02 at 07:07 By Help Net Security 32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are more realistic, noting they feel uncertain about achieving this near impossible outcome. Software compliance adoption varies across

React to this headline:

Loading spinner

48% of security pros are falling behind compliance requirements Read More »

AI agents have access to key data across the enterprise

AI agents have access to key data across the enterprise 2025-05-30 at 08:14 By Help Net Security 82% of organizations already use AI agents, but only 44% of organizations report having policies in place to secure them, according to SailPoint. While 53% are in the process of developing such policies, the reality is that most

React to this headline:

Loading spinner

AI agents have access to key data across the enterprise Read More »

How CISOs can regain ground in the AI fraud war

How CISOs can regain ground in the AI fraud war 2025-05-29 at 08:31 By Help Net Security Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor. Their 2025 Fraud & AML Executive Report, based on surveys of banks, fintechs, credit unions, and digital

React to this headline:

Loading spinner

How CISOs can regain ground in the AI fraud war Read More »

CISOs prioritize AI-driven automation to optimize cybersecurity spending

CISOs prioritize AI-driven automation to optimize cybersecurity spending 2025-05-29 at 08:04 By Help Net Security Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are investing in AI automation to enhance their cybersecurity operations. AI-driven automation can help in detecting and responding to threats

React to this headline:

Loading spinner

CISOs prioritize AI-driven automation to optimize cybersecurity spending Read More »

GitHub becomes go-to platform for malware delivery across Europe

GitHub becomes go-to platform for malware delivery across Europe 2025-05-28 at 07:32 By Help Net Security Phishing has become the go-to method for attackers looking to get past security controls and access sensitive environments in Europe, according to Netskope. Users are now constantly dealing with phishing attempts, which have become so common and credible that

React to this headline:

Loading spinner

GitHub becomes go-to platform for malware delivery across Europe Read More »

4.5% of breaches now extend to fourth parties

4.5% of breaches now extend to fourth parties 2025-05-27 at 07:32 By Help Net Security Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk assessments, conducted annually or quarterly, are too slow to detect active threats. 35.5% of all breaches in 2024 were third-party

React to this headline:

Loading spinner

4.5% of breaches now extend to fourth parties Read More »

AI forces security leaders to rethink hybrid cloud strategies

AI forces security leaders to rethink hybrid cloud strategies 2025-05-26 at 07:01 By Help Net Security Hybrid cloud infrastructure is under mounting strain from the growing influence of AI, according to Gigamon. Cyberthreats grow in scale and sophistication As cyberthreats increase in both scale and sophistication, breach rates have surged to 55% during the past

React to this headline:

Loading spinner

AI forces security leaders to rethink hybrid cloud strategies Read More »

Digital trust is cracking under the pressure of deepfakes, cybercrime

Digital trust is cracking under the pressure of deepfakes, cybercrime 2025-05-23 at 08:02 By Help Net Security 69% of global respondents to a Jumio survey say AI-powered fraud now poses a greater threat to personal security than traditional forms of identity theft. This number rises to 74% in Singapore, with 71% also indicating that AI-generated

React to this headline:

Loading spinner

Digital trust is cracking under the pressure of deepfakes, cybercrime Read More »

Shift left strategy creates heavy burden for developers

Shift left strategy creates heavy burden for developers 2025-05-23 at 07:32 By Help Net Security While 47% of organizations claim to have implemented shift left security strategies, many still struggle with execution gaps and security inefficiencies, according to Pynt. Of those who haven’t implemented shift left, half of them have no plans to do so

React to this headline:

Loading spinner

Shift left strategy creates heavy burden for developers Read More »

CTM360 report: Ransomware exploits trust more than tech

CTM360 report: Ransomware exploits trust more than tech 2025-05-22 at 08:35 By Anamarija Pogorelec A recent wave of ransomware attacks has disrupted major retailers across the UK. According to a new report from CTM360, the attackers didn’t need to break down the door, they were invited in through misplaced trust and weak identity safeguards. This

React to this headline:

Loading spinner

CTM360 report: Ransomware exploits trust more than tech Read More »

Many rush into GenAI deployments, frequently without a security net

Many rush into GenAI deployments, frequently without a security net 2025-05-22 at 08:03 By Help Net Security 70% percent of organizations view the pace of AI development, particularly in GenAI, as the leading security concern related to its adoption, followed by lack of data integrity (64%) and trustworthiness (57%), according to Thales. GenAI becomes a

React to this headline:

Loading spinner

Many rush into GenAI deployments, frequently without a security net Read More »

Nation-state APTs ramp up attacks on Ukraine and the EU

Nation-state APTs ramp up attacks on Ukraine and the EU 2025-05-21 at 07:02 By Help Net Security Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new

React to this headline:

Loading spinner

Nation-state APTs ramp up attacks on Ukraine and the EU Read More »

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide 2025-05-19 at 16:50 By Anamarija Pogorelec A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360. The campaign uses fake Google ads, advanced filtering techniques, to steal sensitive login credentials and bypass MFA. Researchers uncovered

React to this headline:

Loading spinner

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide Read More »

Polymorphic phishing attacks flood inboxes

Polymorphic phishing attacks flood inboxes 2025-05-16 at 08:31 By Help Net Security AI is transforming the phishing threat landscape at a pace many security teams are struggling to match, according to Cofense. In 2024, researchers tracked one malicious email every 42 seconds. Many of the 42-second attacks were part of polymorphic phishing attacks. Unlike traditional

React to this headline:

Loading spinner

Polymorphic phishing attacks flood inboxes Read More »

Ransomware spreads faster, not smarter

Ransomware spreads faster, not smarter 2025-05-14 at 07:00 By Help Net Security The fall of two of the most dominant ransomware syndicates, LockBit and AlphV, triggered a power vacuum across the cybercriminal landscape, acccording to a Black Kite survey. In their place, dozens of new actors emerged, many of them lacking the infrastructure, discipline, or

React to this headline:

Loading spinner

Ransomware spreads faster, not smarter Read More »

Despite drop in cyber claims, BEC keeps going strong

Despite drop in cyber claims, BEC keeps going strong 2025-05-12 at 07:01 By Help Net Security Ransomware claims stabilized in 2024 despite remaining the most costly and disruptive type of cyberattack, according to Coalition. 60% of 2024 claims originated from BEC and funds transfer fraud (FTF) incidents, with 29% of BEC events resulting in FTF.

React to this headline:

Loading spinner

Despite drop in cyber claims, BEC keeps going strong Read More »

What your browser knows about you, from contacts to card numbers

What your browser knows about you, from contacts to card numbers 2025-05-09 at 13:06 By Anamarija Pogorelec Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data. Chrome: the most data-hungry browser (Source: Surfshark) The most data-hungry browsers

React to this headline:

Loading spinner

What your browser knows about you, from contacts to card numbers Read More »

Scroll to Top