survey

Third-party risk management is under the spotlight

Third-party risk management is under the spotlight 2024-08-29 at 06:01 By Help Net Security In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the need for greater digital supply chain resilience, particularly in vital sectors such as financial […]

React to this headline:

Loading spinner

Third-party risk management is under the spotlight Read More »

Cybercriminals capitalize on travel industry’s peak season

Cybercriminals capitalize on travel industry’s peak season 2024-08-28 at 06:31 By Help Net Security Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. Researchers investigated the top 10 travel and hospitality sites to identify externally visible edge, cloud infrastructure, application stack,

React to this headline:

Loading spinner

Cybercriminals capitalize on travel industry’s peak season Read More »

Old methods, new technologies drive fraud losses

Old methods, new technologies drive fraud losses 2024-08-28 at 06:01 By Help Net Security GenAI, deepfakes and cybercrime are critical threats putting intensifying pressures on businesses, according to Experian. Top online security concerns for consumers According to the FTC, consumers reported losing more than $10 billion to fraud in 2023 alone, representing a 14% increase

React to this headline:

Loading spinner

Old methods, new technologies drive fraud losses Read More »

Half of enterprises suffer breaches despite heavy security investments

Half of enterprises suffer breaches despite heavy security investments 2024-08-27 at 06:32 By Help Net Security Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies to safeguard sensitive information. This

React to this headline:

Loading spinner

Half of enterprises suffer breaches despite heavy security investments Read More »

Lateral movement: Clearest sign of unfolding ransomware attack

Lateral movement: Clearest sign of unfolding ransomware attack 2024-08-27 at 06:01 By Help Net Security 44% of unfolding ransomware attacks were spotted during lateral movement, according to Barracuda Networks. 25% of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit with known activity patterns.

React to this headline:

Loading spinner

Lateral movement: Clearest sign of unfolding ransomware attack Read More »

Adversaries love bots, short-lived IP addresses, out-of-band domains

Adversaries love bots, short-lived IP addresses, out-of-band domains 2024-08-26 at 05:32 By Help Net Security Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. Industries ranked by

React to this headline:

Loading spinner

Adversaries love bots, short-lived IP addresses, out-of-band domains Read More »

GenAI buzz fading among senior executives

GenAI buzz fading among senior executives 2024-08-26 at 05:01 By Help Net Security GenAI adoption has reached a critical phase, with 67% of respondents reporting their organization is increasing its investment in GenAI due to strong value to date, according to Deloitte. “The State of Generative AI in the Enterprise: Now decides Next,” is based

React to this headline:

Loading spinner

GenAI buzz fading among senior executives Read More »

Fraud tactics and the growing prevalence of AI scams

Fraud tactics and the growing prevalence of AI scams 2024-08-23 at 07:02 By Help Net Security In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107 million spam calls everyday. The data showed spam flag rates of more than 20% of unknown calls (calls coming

React to this headline:

Loading spinner

Fraud tactics and the growing prevalence of AI scams Read More »

The changing dynamics of ransomware as law enforcement strikes

The changing dynamics of ransomware as law enforcement strikes 2024-08-23 at 06:31 By Help Net Security After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets, and industry dynamics, according to WithSecure. Sectors impacted by ransomware (Source: WithSecure) While ransomware productivity has shown signs of

React to this headline:

Loading spinner

The changing dynamics of ransomware as law enforcement strikes Read More »

Most ransomware attacks occur between 1 a.m. and 5 a.m.

Most ransomware attacks occur between 1 a.m. and 5 a.m. 2024-08-22 at 07:02 By Help Net Security There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock monitoring and investigation of suspicious behaviors,

React to this headline:

Loading spinner

Most ransomware attacks occur between 1 a.m. and 5 a.m. Read More »

Why C-suite leaders are prime cyber targets

Why C-suite leaders are prime cyber targets 2024-08-22 at 06:32 By Help Net Security Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybersecurity Report, underscores the growing sophistication

React to this headline:

Loading spinner

Why C-suite leaders are prime cyber targets Read More »

GenAI models are easily compromised

GenAI models are easily compromised 2024-08-22 at 06:01 By Help Net Security 95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manipulate the applications, gain

React to this headline:

Loading spinner

GenAI models are easily compromised Read More »

Average DDoS attack costs $6,000 per minute

Average DDoS attack costs $6,000 per minute 2024-08-21 at 06:01 By Help Net Security 2023 saw a surge in the frequency and duration of DDoS attacks, and in the first half of 2024, it’s clear that surge has become the new normal, according to Zayo. DDoS attack duration increases DDoS attacks surged 106% from H2

React to this headline:

Loading spinner

Average DDoS attack costs $6,000 per minute Read More »

Organizations turn to biometrics to counter deepfakes

Organizations turn to biometrics to counter deepfakes 2024-08-20 at 06:31 By Help Net Security The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations, according to iProov. Perceptions of

React to this headline:

Loading spinner

Organizations turn to biometrics to counter deepfakes Read More »

Cybercriminals exploit file sharing services to advance phishing attacks

Cybercriminals exploit file sharing services to advance phishing attacks 2024-08-20 at 06:01 By Help Net Security Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of phishing threat in which

React to this headline:

Loading spinner

Cybercriminals exploit file sharing services to advance phishing attacks Read More »

Common API security issues: From exposed secrets to unauthorized access

Common API security issues: From exposed secrets to unauthorized access 2024-08-19 at 06:01 By Help Net Security Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, which attackers frequently misuse. The

React to this headline:

Loading spinner

Common API security issues: From exposed secrets to unauthorized access Read More »

74% of IT professionals worry AI tools will replace them

74% of IT professionals worry AI tools will replace them 2024-08-15 at 07:31 By Help Net Security 56% of security professionals are concerned about AI-powered threats, according to Pluralsight. Many organizations lack structured AI training Over half of surveyed technologists are either extremely concerned or moderately concerned about AI-powered threats, with only 6% saying they

React to this headline:

Loading spinner

74% of IT professionals worry AI tools will replace them Read More »

The AI balancing act: Unlocking potential, dealing with security issues, complexity

The AI balancing act: Unlocking potential, dealing with security issues, complexity 2024-08-15 at 06:31 By Help Net Security The rapid integration of AI and GenAI technologies creates a complex mix of challenges and opportunities for organizations. While the potential benefits are clear, many companies struggle with AI literacy, cautious adoption, and the risks of immature

React to this headline:

Loading spinner

The AI balancing act: Unlocking potential, dealing with security issues, complexity Read More »

DDoS attack volume rises, peak power reaches 1.7 Tbps

DDoS attack volume rises, peak power reaches 1.7 Tbps 2024-08-15 at 06:01 By Help Net Security The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore. Peak attack power rose from 1.6 terabits per second (Tbps) in H2 2023 to 1.7

React to this headline:

Loading spinner

DDoS attack volume rises, peak power reaches 1.7 Tbps Read More »

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware 2024-08-07 at 09:16 By Help Net Security Forescout has published a new report examining the current state of the software supply chain in OT/IoT routers. The study uncovered that OT and IoT cellular routers and those used in small offices and homes contain outdated software components

React to this headline:

Loading spinner

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware Read More »

Scroll to Top