Help Net Security

How to cultivate a culture of continuous cybersecurity improvement
Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does …

ChatGPT’s unknown potential keeps us guessing
An overwhelming number of respondents familiar with ChatGPT were concerned about the risks it poses to security and safety, according to Malwarebytes. They also don’t …

Cybercriminals can break voice authentication with 99% success rate
Computer scientists at the University of Waterloo have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% …

75% of consumers prepared to ditch brands hit by ransomware
As 40% of consumers harbor skepticism regarding organizations’ data protection capabilities, 75% would shift to alternate companies following a ransomware attack, …

How ransomware impacts the healthcare industry
Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net …

Small organizations face security threats on a limited budget
Small organizations face the same security threats as organizations overall but have less resources to address them, according to Netwrix. Lack of budget among small …

Fileless attacks increase 1,400%
Aggregated honeypot data, over a six-month period, showed that more than 50% of the attacks focused on defense evasion, according to Aqua Security. Threat actors avoid …

53% of SaaS licenses remain unused
Enterprise leaders in procurement, IT, and finance need to take immediate action to rationalize their SaaS portfolios to prevent spending and governance challenges from …

IT leaders believe hybrid cloud solutions are the future of IT
IT leaders are losing sleep over improving overall IT performance (60%), data security (50%), process risk and compliance (46%), and the need to improve agility (41%), …

The rise in cyber extortion attacks and its impact on business security
In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A …

One third of security breaches go unnoticed by security professionals
While surface-level confidence around hybrid cloud security is high, with 94% of global respondents stating their security tools and processes provide them with complete …

Short-staffed teams must find ways to do more with less
As more businesses experience resource and cost constraints, 86% of MSPs and MSSPs customers are outsourcing their security needs to consolidate security tools, according to …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)