Help Net Security
![cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/04145410/cybercrime-man-1400-400x200.jpg)
Infostealing malware masquerading as generative AI tools
Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/24112735/iot-1400-400x200.jpg)
99% of IoT exploitation attempts rely on previously known CVEs
The explosion of Internet of Things (IoT) devices has brought about a wide range of security and privacy challenges, according to Bitdefender and NETGEAR. The report is based …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155822/cloud-security-400x200.webp)
47% of corporate data stored in the cloud is sensitive
As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25125026/ai-genai-1-1500-400x200.webp)
Organizations weigh the risks and rewards of using AI
78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk …
![Infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28091843/infosec-week-1200-400x200.webp)
New infosec products of the week: July 5, 2024
Here’s a look at the most interesting products from the past week, featuring releases from LogRhythm, NordVPN, Regula, and Scythe. LogRhythm’s enhancements boost analyst …
![cyber risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15162333/cyber_risks-1500-400x200.webp)
Organizations use outdated approaches to secure APIs
Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
Only 13% of organizations are cyber mature
A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for …
![Secator](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24212032/secator-1500-400x200.webp)
Secator: Open-source pentesting Swiss army knife
Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
Companies spend more on cybersecurity but struggle to track expenses
Most companies do not know how effectively they are investing money to fight the cybersecurity threat, according to Optiv. Cybersecurity budgets are increasing and cyber …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
The impossibility of “getting ahead” in cyber defense
As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25170731/mind-business-1500-400x200.webp)
Inside the minds of CISOs
In this Help Net Security video, Nick McKenzie, CISO of Bugcrowd, discusses the key findings from their recent report, which comes at a crucial time as security leaders’ …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142033/genai-1-1500-400x200.webp)
Deepfakes and voice clones are undermining election integrity
As the volume of digital business rises year over year, the potential for AI-enhanced digital fraud increases with it, according to Telesign. A new Telesign report highlights …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege