survey

What open source means for cybersecurity

What open source means for cybersecurity 2024-12-23 at 06:03 By Help Net Security With outdated and inadequately maintained components, along with insecure dependencies, the open-source ecosystem presents numerous risks that could expose organizations to threats. In this article, you will find excerpts from 2024 open-source security reports that can help your organization strengthen its software […]

React to this headline:

Loading spinner

What open source means for cybersecurity Read More »

AI is becoming the weapon of choice for cybercriminals

AI is becoming the weapon of choice for cybercriminals 2024-12-20 at 07:03 By Help Net Security AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overreliance on GenAI to develop

React to this headline:

Loading spinner

AI is becoming the weapon of choice for cybercriminals Read More »

46% of financial institutions had a data breach in the past 24 months

46% of financial institutions had a data breach in the past 24 months 2024-12-20 at 06:34 By Help Net Security As the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to SailPoint. Financial institutions face growing cyber

React to this headline:

Loading spinner

46% of financial institutions had a data breach in the past 24 months Read More »

Ransomware in 2024: New players, bigger payouts, and smarter tactics

Ransomware in 2024: New players, bigger payouts, and smarter tactics 2024-12-19 at 06:03 By Help Net Security In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article, you will find excerpts from

React to this headline:

Loading spinner

Ransomware in 2024: New players, bigger payouts, and smarter tactics Read More »

Consumers wrongly attribute all data breaches to cybercriminals

Consumers wrongly attribute all data breaches to cybercriminals 2024-12-18 at 06:01 By Help Net Security Breaches in 2024 had less impact on consumers’ trust in brands compared to the previous year (a 6.5% decrease from 62% in 2023 to 58% in 2024), according to a recent Vercara report. Most consumers also remain unaware of the

React to this headline:

Loading spinner

Consumers wrongly attribute all data breaches to cybercriminals Read More »

Overlooking platform security weakens long-term cybersecurity posture

Overlooking platform security weakens long-term cybersecurity posture 2024-12-16 at 06:04 By Help Net Security Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. The report, based on a global study of 800+ IT and security decision-makers (ITSDMs)

React to this headline:

Loading spinner

Overlooking platform security weakens long-term cybersecurity posture Read More »

CISOs need to consider the personal risks associated with their role

CISOs need to consider the personal risks associated with their role 2024-12-13 at 06:34 By Help Net Security 70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their opinion of the role, according to BlackFog. 34% believed that the trend of individuals being prosecuted following

React to this headline:

Loading spinner

CISOs need to consider the personal risks associated with their role Read More »

Containers have 600+ vulnerabilities on average

Containers have 600+ vulnerabilities on average 2024-12-11 at 06:31 By Help Net Security Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container security right. Issues from misconfigured clouds, containers, and networks to uncertainty over who owns container security throughout the

React to this headline:

Loading spinner

Containers have 600+ vulnerabilities on average Read More »

Businesses plagued by constant stream of malicious emails

Businesses plagued by constant stream of malicious emails 2024-12-09 at 06:03 By Help Net Security 36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and 2.3% of those contained

React to this headline:

Loading spinner

Businesses plagued by constant stream of malicious emails Read More »

Teenagers leading new wave of cybercrime

Teenagers leading new wave of cybercrime 2024-12-06 at 07:42 By Help Net Security Global data breaches show no signs of slowing down as this year has already exceeded 2023 in the number of data breaches and consumers impacted, according to Experian. Younger cybercriminals on the rise Today, the world of cyber hacking is not confined

React to this headline:

Loading spinner

Teenagers leading new wave of cybercrime Read More »

GenAI makes phishing attacks more believable and cost-effective

GenAI makes phishing attacks more believable and cost-effective 2024-12-06 at 06:39 By Help Net Security GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s research revealed that

React to this headline:

Loading spinner

GenAI makes phishing attacks more believable and cost-effective Read More »

70% of open-source components are poorly or no longer maintained

70% of open-source components are poorly or no longer maintained 2024-12-04 at 06:35 By Help Net Security The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, according to Lineaje. Open-source code risks rise with anonymous contributions Microsoft estimates that its customers face 600 million cyberattacks

React to this headline:

Loading spinner

70% of open-source components are poorly or no longer maintained Read More »

65% of office workers bypass cybersecurity to boost productivity

65% of office workers bypass cybersecurity to boost productivity 2024-12-04 at 06:04 By Help Net Security High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to re-think the way they protect their workforce, according to CyberArk. CyberArk surveyed 14,003 employees in the UK, USA, France,

React to this headline:

Loading spinner

65% of office workers bypass cybersecurity to boost productivity Read More »

AI-based tools designed for criminal activity are in high demand

AI-based tools designed for criminal activity are in high demand 2024-11-29 at 06:03 By Help Net Security Multiple regional conflicts, such as Russia’s continued invasion of Ukraine and the Israel-Hamas conflict, have resulted in a surge in cyberattacks and hacktivist activities, according to Trellix. AI-driven ransomware boosts cybercrime tactics The research examines an increasingly complex

React to this headline:

Loading spinner

AI-based tools designed for criminal activity are in high demand Read More »

VPN vulnerabilities, weak credentials fuel ransomware attacks

VPN vulnerabilities, weak credentials fuel ransomware attacks 2024-11-28 at 08:12 By Help Net Security Attackers leveraging virtual private network (VPN) vulnerabilities and weak passwords for initial access contributed to nearly 30% of ransomware attacks, according to Corvus Insurance. According to the Q3 report, many of these incidents were traced to outdated software or VPN accounts

React to this headline:

Loading spinner

VPN vulnerabilities, weak credentials fuel ransomware attacks Read More »

Crypto companies are losing ground to deepfake attacks

Crypto companies are losing ground to deepfake attacks 2024-11-28 at 06:34 By Help Net Security The crypto sector stands out as the only surveyed industry where deepfake fraud surpasses traditional document fraud in prevalence, according to Regula. Crypto companies suffer significant losses from fraud The study finds that 57% of crypto companies report audio deepfake

React to this headline:

Loading spinner

Crypto companies are losing ground to deepfake attacks Read More »

Supply chain managers underestimate cybersecurity risks in warehouses

Supply chain managers underestimate cybersecurity risks in warehouses 2024-11-27 at 06:47 By Help Net Security 32% of warehouse respondents report that social engineering is one of the most-used entry points in warehouse cyberattacks – tied with software vulnerabilities (32%) and followed by devices (19%), according to Ivanti. Cyberattacks on warehouses threaten supply chain stability As

React to this headline:

Loading spinner

Supply chain managers underestimate cybersecurity risks in warehouses Read More »

Cybercriminals turn to pen testers to test ransomware efficiency

Cybercriminals turn to pen testers to test ransomware efficiency 2024-11-22 at 07:04 By Help Net Security Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato

React to this headline:

Loading spinner

Cybercriminals turn to pen testers to test ransomware efficiency Read More »

Deepfake attacks occur every five minutes

Deepfake attacks occur every five minutes 2024-11-22 at 06:35 By Help Net Security As cybercriminals continue to adapt their techniques to find new ways through defenses, AI-assisted fraud is growing increasingly sophisticated and frequent, according to Entrust. The findings reveal a deepfake attack happened every five minutes in 2024, while digital document forgeries increased 244%

React to this headline:

Loading spinner

Deepfake attacks occur every five minutes Read More »

Full recovery from breaches takes longer than expected

Full recovery from breaches takes longer than expected 2024-11-21 at 06:03 By Help Net Security In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel unprepared for future

React to this headline:

Loading spinner

Full recovery from breaches takes longer than expected Read More »

Scroll to Top