threats

Maritime cybersecurity is the iceberg no one sees coming

Maritime cybersecurity is the iceberg no one sees coming 2025-08-28 at 08:01 By Sinisa Markovic Maritime transport, the backbone of global trade, is adapting to shifting economic, political, and technological conditions. Advances in technology have improved efficiency, bringing innovations such as remote cargo monitoring, advanced energy management systems, and automation of various onboard operations. But […]

React to this headline:

Loading spinner

Maritime cybersecurity is the iceberg no one sees coming Read More »

The new battleground for CISOs is human behavior

The new battleground for CISOs is human behavior 2025-08-22 at 08:40 By Anamarija Pogorelec Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes it harder to catch.” Only about one in four cybersecurity teams are effective at collaborating with the broader business (Source: LevelBlue)

React to this headline:

Loading spinner

The new battleground for CISOs is human behavior Read More »

How military leadership prepares veterans for cybersecurity success

How military leadership prepares veterans for cybersecurity success 2025-08-15 at 09:47 By Mirko Zorz In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans with the mindset, resilience, and strategic thinking needed to excel in cybersecurity. Drawing on habits such

React to this headline:

Loading spinner

How military leadership prepares veterans for cybersecurity success Read More »

APT groups are getting personal, and CISOs should be concerned

APT groups are getting personal, and CISOs should be concerned 2025-08-12 at 14:42 By Mirko Zorz Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work remotely, store

React to this headline:

Loading spinner

APT groups are getting personal, and CISOs should be concerned Read More »

Why DNS threats should be on every CISO’s radar in 2025

Why DNS threats should be on every CISO’s radar in 2025 2025-08-12 at 07:32 By Sinisa Markovic DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox, attackers are changing tactics, and enterprises are feeling the pressure. The report shows that DNS is being used

React to this headline:

Loading spinner

Why DNS threats should be on every CISO’s radar in 2025 Read More »

From fake CAPTCHAs to RATs: Inside 2025’s cyber deception threat trends

From fake CAPTCHAs to RATs: Inside 2025’s cyber deception threat trends 2025-08-08 at 08:07 By Sinisa Markovic Cybercriminals are getting better at lying. That’s the takeaway from a new LevelBlue report, which outlines how attackers are using social engineering and legitimate tools to quietly move through environments before they’re caught. Data showing at what stage

React to this headline:

Loading spinner

From fake CAPTCHAs to RATs: Inside 2025’s cyber deception threat trends Read More »

Ransomware is up, zero-days are booming, and your IP camera might be next

Ransomware is up, zero-days are booming, and your IP camera might be next 2025-08-06 at 08:47 By Help Net Security Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging 20

React to this headline:

Loading spinner

Ransomware is up, zero-days are booming, and your IP camera might be next Read More »

Ransomware groups shift to quadruple extortion to maximize pressure

Ransomware groups shift to quadruple extortion to maximize pressure 2025-08-05 at 07:33 By Help Net Security Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware extortion tactics (Source: Akamai) The emerging trend of quadruple extortion includes using DDoS attacks to

React to this headline:

Loading spinner

Ransomware groups shift to quadruple extortion to maximize pressure Read More »

What attackers know about your company thanks to AI

What attackers know about your company thanks to AI 2025-08-01 at 08:48 By Help Net Security In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key areas: how GenAI lowers the technical barrier for attackers, enables highly

React to this headline:

Loading spinner

What attackers know about your company thanks to AI Read More »

Ports are getting smarter and more hackable

Ports are getting smarter and more hackable 2025-07-23 at 08:31 By Sinisa Markovic A new policy brief from NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) warns that critical port infrastructure, responsible for 80 percent of global trade, is increasingly under attack by threat actors tied to Russia, Iran, and China. These ports are essential

React to this headline:

Loading spinner

Ports are getting smarter and more hackable Read More »

World Health Organization CISO on securing global health emergencies

World Health Organization CISO on securing global health emergencies 2025-07-21 at 08:49 By Mirko Zorz In this Help Net Security interview, Flavio Aggio, CISO at the World Health Organization (WHO), explains how the organization prepares for and responds to cyber threats during global health emergencies. These crises often lead to an increase in phishing scams,

React to this headline:

Loading spinner

World Health Organization CISO on securing global health emergencies Read More »

Are your employees using Chinese GenAI tools at work?

Are your employees using Chinese GenAI tools at work? 2025-07-21 at 07:35 By Anamarija Pogorelec Nearly one in 12 employees are using Chinese-developed generative AI tools at work, and they’re exposing sensitive data in the process. That’s according to new research from Harmonic Security, which analyzed the behavior of roughly 14,000 end users in the

React to this headline:

Loading spinner

Are your employees using Chinese GenAI tools at work? Read More »

Cyberattacks are draining millions from the hospitality industry

Cyberattacks are draining millions from the hospitality industry 2025-07-03 at 08:37 By Sinisa Markovic Every day, millions of travelers share sensitive information like passports, credit card numbers, and personal details with hotels, restaurants, and travel services. This puts pressure on the hospitality sector to keep that information safe and private. Cybersecurity challenges in the hospitality

React to this headline:

Loading spinner

Cyberattacks are draining millions from the hospitality industry Read More »

90% aren’t ready for AI attacks, are you?

90% aren’t ready for AI attacks, are you? 2025-07-03 at 07:32 By Help Net Security As AI reshapes business, 90% of organizations are not adequately prepared to secure their AI-driven future, according to a new report from Accenture. Globally, 63% of companies are in the “Exposed Zone,” indicating they lack both a cohesive cybersecurity strategy

React to this headline:

Loading spinner

90% aren’t ready for AI attacks, are you? Read More »

Cyber threats are changing and here’s what you should watch for

Cyber threats are changing and here’s what you should watch for 2025-05-26 at 07:33 By Help Net Security In this Help Net Security video, Stefan Tanase, Cyber Intelligence Expert at CSIS, gives an overview of how cybercriminals are changing their tactics, including using legitimate tools to avoid detection and developing more advanced info-stealing malware. Tanase

React to this headline:

Loading spinner

Cyber threats are changing and here’s what you should watch for Read More »

Key tips to stay safe from deepfake and AI threats

Key tips to stay safe from deepfake and AI threats 2025-05-06 at 07:31 By Help Net Security In this Help Net Security video, Joshua McKenty, CEO of Polyguard, talks about how to protect yourself from deepfake and AI threats, which are getting harder to spot and easier to launch. Attackers can clone your voice or

React to this headline:

Loading spinner

Key tips to stay safe from deepfake and AI threats Read More »

AI and automation shift the cybersecurity balance toward attackers

AI and automation shift the cybersecurity balance toward attackers 2025-05-02 at 09:02 By Help Net Security Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security.

React to this headline:

Loading spinner

AI and automation shift the cybersecurity balance toward attackers Read More »

Mobile security is a frontline risk. Are you ready?

Mobile security is a frontline risk. Are you ready? 2025-04-30 at 08:33 By Help Net Security The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the primary attack surfaces.

React to this headline:

Loading spinner

Mobile security is a frontline risk. Are you ready? Read More »

DDoS attacks jump 358% compared to last year

DDoS attacks jump 358% compared to last year 2025-04-29 at 08:04 By Mirko Zorz Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared to the same time last year. Their Q1 2025 DDoS report highlights a rise in the number and size of attacks,

React to this headline:

Loading spinner

DDoS attacks jump 358% compared to last year Read More »

Why global tensions are a cybersecurity problem for every business

Why global tensions are a cybersecurity problem for every business 2025-04-01 at 09:03 By Mirko Zorz With global tensions climbing, cyber attacks linked to nation-states and their allies are becoming more common, sophisticated, and destructive. For organizations, cybersecurity can’t be treated as separate from world events anymore, they’re closely connected. Conflict between countries is spilling

React to this headline:

Loading spinner

Why global tensions are a cybersecurity problem for every business Read More »

Scroll to Top