threat

Medical device cyberattacks push hospitals into crisis mode

Medical device cyberattacks push hospitals into crisis mode 2025-06-23 at 07:14 By Help Net Security 22% of healthcare organizations have experienced cyberattacks that directly impacted medical devices, according to RunSafe Security. Three-quarters of these incidents disrupted patient care, including 24% that required patient transfers to other facilities. The survey reveals that healthcare cybersecurity has evolved […]

React to this headline:

Loading spinner

Medical device cyberattacks push hospitals into crisis mode Read More »

Cloud and AI drive efficiency, but open doors for attackers

Cloud and AI drive efficiency, but open doors for attackers 2025-06-10 at 07:45 By Help Net Security AI adoption is increasing, with 84% of organizations now using AI in the cloud, according to Orca Security. But this innovation comes with new risks: 62% of organizations have at least one vulnerable AI package, and some of

React to this headline:

Loading spinner

Cloud and AI drive efficiency, but open doors for attackers Read More »

How well do you know your remote IT worker?

How well do you know your remote IT worker? 2025-05-27 at 08:06 By Sinisa Markovic Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data. Recently, more of these schemes have been linked to North Korea.

React to this headline:

Loading spinner

How well do you know your remote IT worker? Read More »

Global cybersecurity readiness remains critically low

Global cybersecurity readiness remains critically low 2025-05-08 at 07:34 By Help Net Security Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 Cybersecurity Readiness Index. This is a slight increase from last year’s index, in which 3% of organizations worldwide were designated as

React to this headline:

Loading spinner

Global cybersecurity readiness remains critically low Read More »

Cybercriminals blend AI and social engineering to bypass detection

Cybercriminals blend AI and social engineering to bypass detection 2025-04-21 at 08:04 By Help Net Security Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense. Researchers analyzed thousands of alerts, mapping them to the MITRE ATT&CK framework,

React to this headline:

Loading spinner

Cybercriminals blend AI and social engineering to bypass detection Read More »

The human side of insider threats: People, pressure, and payback

The human side of insider threats: People, pressure, and payback 2025-04-01 at 08:02 By Help Net Security While cybercriminals are often in the spotlight, one of the most dangerous threats to your company might be hiding in plain sight, within your own team. Employees, contractors, or business partners who have access to sensitive information can

React to this headline:

Loading spinner

The human side of insider threats: People, pressure, and payback Read More »

Healthcare’s alarming cybersecurity reality

Healthcare’s alarming cybersecurity reality 2025-03-28 at 07:35 By Help Net Security 89% of healthcare organizations have the top 1% of riskiest Internet of Medical Things (IoMT) devices – which contain known exploitable vulnerabilities (KEVs) linked to active ransomware campaigns as well as an insecure connection to the internet – on their networks, according to Claroty.

React to this headline:

Loading spinner

Healthcare’s alarming cybersecurity reality Read More »

Chinese military-linked companies dominate US digital supply chain

Chinese military-linked companies dominate US digital supply chain 2025-03-20 at 07:35 By Help Net Security Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military

React to this headline:

Loading spinner

Chinese military-linked companies dominate US digital supply chain Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

300% increase in endpoint malware detections

300% increase in endpoint malware detections 2025-02-20 at 07:04 By Help Net Security The third quarter of 2024 saw a dramatic shift in the types of malware detected at network perimeters, according to a new WatchGuard report. The report’s key findings include a 300% increase quarter over quarter of endpoint malware detections, highlighted by growing

React to this headline:

Loading spinner

300% increase in endpoint malware detections Read More »

Inconsistent security strategies fuel third-party threats

Inconsistent security strategies fuel third-party threats 2025-02-14 at 06:36 By Help Net Security 47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute. Third-party security incidents persist Notably, 64% of respondents say these types of third-party

React to this headline:

Loading spinner

Inconsistent security strategies fuel third-party threats Read More »

CISOs and boards see things differently

CISOs and boards see things differently 2025-02-13 at 06:35 By Help Net Security Splunk’s latest CISO Report reveals critical insights into cybersecurity priorities, threat trends, and strategies for resilience. In this Help Net Security video, Kirsty Paine, Field CTO & Strategic Advisor at Splunk, discusses the key findings and what they mean for security teams.

React to this headline:

Loading spinner

CISOs and boards see things differently Read More »

DeepSeek’s popularity exploited by malware peddlers, scammers

DeepSeek’s popularity exploited by malware peddlers, scammers 2025-01-29 at 15:18 By Zeljka Zorz As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of the cost, users are rushing to try out DeepSeek’s AI tool. In the process, they

React to this headline:

Loading spinner

DeepSeek’s popularity exploited by malware peddlers, scammers Read More »

eBay CISO on managing long-term cybersecurity planning and ROI

eBay CISO on managing long-term cybersecurity planning and ROI 2025-01-07 at 07:33 By Mirko Zorz In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, and addressing employee cybersecurity fatigue.

React to this headline:

Loading spinner

eBay CISO on managing long-term cybersecurity planning and ROI Read More »

Researchers unearth two previously unknown Linux backdoors

Researchers unearth two previously unknown Linux backdoors 2024-11-21 at 12:12 By Help Net Security ESET researchers have identified multiple samples of two previously unknown Linux backdoors: WolfsBane and FireWood. The goal of the backdoors and tools discovered is cyberespionage that targets sensitive data such as system information, user credentials, and specific files and directories. These

React to this headline:

Loading spinner

Researchers unearth two previously unknown Linux backdoors Read More »

Evolving cloud threats: Insights and recommendations

Evolving cloud threats: Insights and recommendations 2024-10-23 at 07:03 By Help Net Security Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor authentication (MFA). This often leads to business email compromise (BEC), which

React to this headline:

Loading spinner

Evolving cloud threats: Insights and recommendations Read More »

How nation-states exploit political instability to launch cyber operations

How nation-states exploit political instability to launch cyber operations 2024-10-15 at 07:37 By Mirko Zorz In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how nation-states and politically motivated groups exploit unrest

React to this headline:

Loading spinner

How nation-states exploit political instability to launch cyber operations Read More »

Developing an effective cyberwarfare response plan

Developing an effective cyberwarfare response plan 2024-09-27 at 07:01 By Mirko Zorz In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strategies to combat these evolving threats. How has adopting AI

React to this headline:

Loading spinner

Developing an effective cyberwarfare response plan Read More »

Organizations turn to biometrics to counter deepfakes

Organizations turn to biometrics to counter deepfakes 2024-08-20 at 06:31 By Help Net Security The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations, according to iProov. Perceptions of

React to this headline:

Loading spinner

Organizations turn to biometrics to counter deepfakes Read More »

74% of IT professionals worry AI tools will replace them

74% of IT professionals worry AI tools will replace them 2024-08-15 at 07:31 By Help Net Security 56% of security professionals are concerned about AI-powered threats, according to Pluralsight. Many organizations lack structured AI training Over half of surveyed technologists are either extremely concerned or moderately concerned about AI-powered threats, with only 6% saying they

React to this headline:

Loading spinner

74% of IT professionals worry AI tools will replace them Read More »

Scroll to Top