threat

AI made crypto scams far more dangerous

AI made crypto scams far more dangerous 2025-09-18 at 08:26 By Sinisa Markovic The first half of 2025 saw one of the worst waves of crypto hacks to date, with more than $3.01 billion stolen. AI was a big part of it, making scams easier to run and letting even low-skill criminals get in on […]

React to this headline:

Loading spinner

AI made crypto scams far more dangerous Read More »

AI video surveillance could end privacy as we know it

AI video surveillance could end privacy as we know it 2025-09-16 at 08:40 By Sinisa Markovic AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on the other, it can easily cross the line into intrusion. The more we let technology watch and track our

React to this headline:

Loading spinner

AI video surveillance could end privacy as we know it Read More »

Detecting danger: EASM in the modern security stack

Detecting danger: EASM in the modern security stack 2025-09-03 at 08:03 By Help Net Security In today’s complex threat environment, the challenge for security professionals isn’t just defeating threats – it’s finding your vulnerabilities in the first place. That’s where External Attack Surface Management (EASM) tools come in. EASM can identify the many weaknesses that

React to this headline:

Loading spinner

Detecting danger: EASM in the modern security stack Read More »

The energy sector has no time to wait for the next cyberattack

The energy sector has no time to wait for the next cyberattack 2025-08-26 at 08:57 By Sinisa Markovic The energy sector remains a major target for cybercriminals. Beyond disrupting daily routines, a power outage can undermine economic stability and public safety. Rising demand for electricity, fueled by technology and digital growth, only adds to the

React to this headline:

Loading spinner

The energy sector has no time to wait for the next cyberattack Read More »

The AI security crisis no one is preparing for

The AI security crisis no one is preparing for 2025-08-20 at 08:03 By Mirko Zorz In this Help Net Security interview, Jacob Ideskog, CTO of Curity, discusses the risks AI agents pose to organizations. As these agents become embedded in enterprise systems, the potential for misuse, data leakage, and unauthorized access grows. Ideskog warns that

React to this headline:

Loading spinner

The AI security crisis no one is preparing for Read More »

The top CTEM platforms you should know in 2025

The top CTEM platforms you should know in 2025 2025-08-14 at 08:02 By Help Net Security Continuous Threat Exposure Management (CTEM) is a modern cybersecurity strategy originally coined by Gartner analysts, which focuses on identifying, prioritizing, validating, and mobilizing teams to reduce threat exposure across an organization’s full attack surface. It’s in a category of

React to this headline:

Loading spinner

The top CTEM platforms you should know in 2025 Read More »

Securing vehicles as they become platforms for code and data

Securing vehicles as they become platforms for code and data 2025-07-15 at 08:31 By Mirko Zorz In this Help Net Security interview, Robert Knoblauch, CISO at Element Fleet Management, discusses how the rise of connected vehicles and digital operations is reshaping fleet management cybersecurity. He points to growing risks like API breaches, tampering with onboard

React to this headline:

Loading spinner

Securing vehicles as they become platforms for code and data Read More »

Federal Reserve System CISO on aligning cyber risk management with transparency, trust

Federal Reserve System CISO on aligning cyber risk management with transparency, trust 2025-07-01 at 09:08 By Mirko Zorz In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy. She explains how the Fed assesses potential disruptions to financial stability and

React to this headline:

Loading spinner

Federal Reserve System CISO on aligning cyber risk management with transparency, trust Read More »

Medical device cyberattacks push hospitals into crisis mode

Medical device cyberattacks push hospitals into crisis mode 2025-06-23 at 07:14 By Help Net Security 22% of healthcare organizations have experienced cyberattacks that directly impacted medical devices, according to RunSafe Security. Three-quarters of these incidents disrupted patient care, including 24% that required patient transfers to other facilities. The survey reveals that healthcare cybersecurity has evolved

React to this headline:

Loading spinner

Medical device cyberattacks push hospitals into crisis mode Read More »

Cloud and AI drive efficiency, but open doors for attackers

Cloud and AI drive efficiency, but open doors for attackers 2025-06-10 at 07:45 By Help Net Security AI adoption is increasing, with 84% of organizations now using AI in the cloud, according to Orca Security. But this innovation comes with new risks: 62% of organizations have at least one vulnerable AI package, and some of

React to this headline:

Loading spinner

Cloud and AI drive efficiency, but open doors for attackers Read More »

How well do you know your remote IT worker?

How well do you know your remote IT worker? 2025-05-27 at 08:06 By Sinisa Markovic Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data. Recently, more of these schemes have been linked to North Korea.

React to this headline:

Loading spinner

How well do you know your remote IT worker? Read More »

Global cybersecurity readiness remains critically low

Global cybersecurity readiness remains critically low 2025-05-08 at 07:34 By Help Net Security Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 Cybersecurity Readiness Index. This is a slight increase from last year’s index, in which 3% of organizations worldwide were designated as

React to this headline:

Loading spinner

Global cybersecurity readiness remains critically low Read More »

Cybercriminals blend AI and social engineering to bypass detection

Cybercriminals blend AI and social engineering to bypass detection 2025-04-21 at 08:04 By Help Net Security Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense. Researchers analyzed thousands of alerts, mapping them to the MITRE ATT&CK framework,

React to this headline:

Loading spinner

Cybercriminals blend AI and social engineering to bypass detection Read More »

The human side of insider threats: People, pressure, and payback

The human side of insider threats: People, pressure, and payback 2025-04-01 at 08:02 By Help Net Security While cybercriminals are often in the spotlight, one of the most dangerous threats to your company might be hiding in plain sight, within your own team. Employees, contractors, or business partners who have access to sensitive information can

React to this headline:

Loading spinner

The human side of insider threats: People, pressure, and payback Read More »

Healthcare’s alarming cybersecurity reality

Healthcare’s alarming cybersecurity reality 2025-03-28 at 07:35 By Help Net Security 89% of healthcare organizations have the top 1% of riskiest Internet of Medical Things (IoMT) devices – which contain known exploitable vulnerabilities (KEVs) linked to active ransomware campaigns as well as an insecure connection to the internet – on their networks, according to Claroty.

React to this headline:

Loading spinner

Healthcare’s alarming cybersecurity reality Read More »

Chinese military-linked companies dominate US digital supply chain

Chinese military-linked companies dominate US digital supply chain 2025-03-20 at 07:35 By Help Net Security Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military

React to this headline:

Loading spinner

Chinese military-linked companies dominate US digital supply chain Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

300% increase in endpoint malware detections

300% increase in endpoint malware detections 2025-02-20 at 07:04 By Help Net Security The third quarter of 2024 saw a dramatic shift in the types of malware detected at network perimeters, according to a new WatchGuard report. The report’s key findings include a 300% increase quarter over quarter of endpoint malware detections, highlighted by growing

React to this headline:

Loading spinner

300% increase in endpoint malware detections Read More »

Inconsistent security strategies fuel third-party threats

Inconsistent security strategies fuel third-party threats 2025-02-14 at 06:36 By Help Net Security 47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute. Third-party security incidents persist Notably, 64% of respondents say these types of third-party

React to this headline:

Loading spinner

Inconsistent security strategies fuel third-party threats Read More »

CISOs and boards see things differently

CISOs and boards see things differently 2025-02-13 at 06:35 By Help Net Security Splunk’s latest CISO Report reveals critical insights into cybersecurity priorities, threat trends, and strategies for resilience. In this Help Net Security video, Kirsty Paine, Field CTO & Strategic Advisor at Splunk, discusses the key findings and what they mean for security teams.

React to this headline:

Loading spinner

CISOs and boards see things differently Read More »

Scroll to Top