survey

Global cybersecurity readiness remains critically low

Global cybersecurity readiness remains critically low 2025-05-08 at 07:34 By Help Net Security Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 Cybersecurity Readiness Index. This is a slight increase from last year’s index, in which 3% of organizations worldwide were designated as […]

React to this headline:

Loading spinner

Global cybersecurity readiness remains critically low Read More »

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts 2025-05-08 at 07:02 By Help Net Security Healthcare organizations are facing a growing data security challenge from within, according to a new report from Netskope Threat Labs. The analysis reveals that employees in the sector are frequently attempting to upload sensitive information, including potentially protected

React to this headline:

Loading spinner

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts Read More »

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable 2025-05-07 at 09:46 By Mirko Zorz A new report from bot defense firm Kasada has exposed the growing threat of ALTSRUS, a fraud syndicate targeting some of the most vulnerable corners of the digital economy. Researchers revealed how the group has scaled its operations to steal

React to this headline:

Loading spinner

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable Read More »

Personal data of top executives easily found online

Personal data of top executives easily found online 2025-05-07 at 07:01 By Help Net Security The personal information of 75% of corporate directors can be found on people search sites, according to Incogni. People search sites claim to reveal a variety of personal details, including public records, phone numbers, and even property values. Home addresses

React to this headline:

Loading spinner

Personal data of top executives easily found online Read More »

Ransomware spike exposes cracks in cloud security

Ransomware spike exposes cracks in cloud security 2025-05-05 at 07:01 By Help Net Security 90% of IT and security leaders said their organization experienced a cyberattack within the last year, according to a report by Rubrik. “Many organizations that move to the cloud assume their providers will handle security,” said Joe Hladik, Head of Rubrik

React to this headline:

Loading spinner

Ransomware spike exposes cracks in cloud security Read More »

People know password reuse is risky but keep doing it anyway

People know password reuse is risky but keep doing it anyway 2025-05-02 at 08:16 By Help Net Security 35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of

React to this headline:

Loading spinner

People know password reuse is risky but keep doing it anyway Read More »

Low-tech phishing attacks are gaining ground

Low-tech phishing attacks are gaining ground 2025-05-01 at 07:02 By Help Net Security Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based on an analysis of global real-world data and highlights the most significant email security trends from the first quarter of 2025. Callback

React to this headline:

Loading spinner

Low-tech phishing attacks are gaining ground Read More »

Mobile security is a frontline risk. Are you ready?

Mobile security is a frontline risk. Are you ready? 2025-04-30 at 08:33 By Help Net Security The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the primary attack surfaces.

React to this headline:

Loading spinner

Mobile security is a frontline risk. Are you ready? Read More »

Why cyber resilience must be part of every organization’s DNA

Why cyber resilience must be part of every organization’s DNA 2025-04-30 at 07:05 By Help Net Security As AI brings about excitement and transformative potential, the report reveals that organizations are forging ahead with innovations despite increased security concerns, according to LevelBlue’s 2025 Futures Report. In fact, just 29% of executives surveyed say they are

React to this headline:

Loading spinner

Why cyber resilience must be part of every organization’s DNA Read More »

Investing in security? It’s not helping you fix what matters faster

Investing in security? It’s not helping you fix what matters faster 2025-04-29 at 07:30 By Help Net Security Automation and structured collaboration have a strong, positive influence on the efficiency of vulnerability management, according to Seemplicity. However, manual processes, unstructured workflows, and excessive noise from vulnerability scanning tools continue to slow remediation efforts, leading to

React to this headline:

Loading spinner

Investing in security? It’s not helping you fix what matters faster Read More »

Most critical vulnerabilities aren’t worth your attention

Most critical vulnerabilities aren’t worth your attention 2025-04-28 at 07:03 By Help Net Security Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still contain at least one vulnerability By analyzing

React to this headline:

Loading spinner

Most critical vulnerabilities aren’t worth your attention Read More »

Flexible working models fuel surge in device theft

Flexible working models fuel surge in device theft 2025-04-25 at 08:34 By Help Net Security 76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of organizations with flexible

React to this headline:

Loading spinner

Flexible working models fuel surge in device theft Read More »

A new era of cyber threats is approaching for the energy sector

A new era of cyber threats is approaching for the energy sector 2025-04-24 at 08:17 By Sinisa Markovic Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful attack can be severe, potentially

React to this headline:

Loading spinner

A new era of cyber threats is approaching for the energy sector Read More »

One in three security teams trust AI to act autonomously

One in three security teams trust AI to act autonomously 2025-04-24 at 07:39 By Help Net Security While AI adoption is widespread, its impact on productivity, trust, and team structure varies sharply by role and region, according to Exabeam. The findings confirm a critical divide: 71% of executives believe AI has significantly improved productivity across

React to this headline:

Loading spinner

One in three security teams trust AI to act autonomously Read More »

2025 Data Breach Investigations Report: Third-party breaches double

2025 Data Breach Investigations Report: Third-party breaches double 2025-04-23 at 14:55 By Sinisa Markovic The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according to Verizon’s 2025 Data Breach Investigations Report. Researchers analyzed 22,052 real-world security incidents, of which 12,195 were confirmed data breaches. This

React to this headline:

Loading spinner

2025 Data Breach Investigations Report: Third-party breaches double Read More »

Phishing emails delivering infostealers surge 84%

Phishing emails delivering infostealers surge 84% 2025-04-23 at 07:31 By Help Net Security Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM. Researchers observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied

React to this headline:

Loading spinner

Phishing emails delivering infostealers surge 84% Read More »

54% of tech hiring managers expect layoffs in 2025

54% of tech hiring managers expect layoffs in 2025 2025-04-22 at 18:22 By Help Net Security 54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say employees whose roles can be replaced by AI are most likely to be let go, according to a new

React to this headline:

Loading spinner

54% of tech hiring managers expect layoffs in 2025 Read More »

The C-suite gap that’s putting your company at risk

The C-suite gap that’s putting your company at risk 2025-04-22 at 08:03 By Help Net Security New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on how exposed their companies are or where the biggest threats come from. CISOs more concerned about cybersecurity (Source: EY

React to this headline:

Loading spinner

The C-suite gap that’s putting your company at risk Read More »

Compliance weighs heavily on security and GRC teams

Compliance weighs heavily on security and GRC teams 2025-04-22 at 07:24 By Help Net Security Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report reveals that fragmented workflows, manual evidence gathering and poor collaboration between security and governance, risk and compliance (GRC) teams are

React to this headline:

Loading spinner

Compliance weighs heavily on security and GRC teams Read More »

Scroll to Top