![X](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10171257/x-twitter-1500-400x200.webp)
How AI-powered software spreads Russian disinformation on X
The US Justice Department (DoJ) has seized two US-based domains used by Russian threat actors to create fake profiles on X (formerly Twitter) that would spread disinformation …
![bots](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25140632/bots-red-1500-400x200.webp)
Web scraping is not just a security or fraud problem
Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations Web scraping is not …
![world map](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29222743/world-map-1500-400x200.webp)
Cybersecurity teams gear up for tougher challenges in 2024
In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are …
![bad bots](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15111417/bad_bots-1400-400x200.jpg)
Bots dominate internet activity, account for nearly half of all traffic
49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest level Imperva has reported since it began monitoring automated …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Cybercriminal adoption of browser fingerprinting
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting …
![bad bots](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15111417/bad_bots-1400-400x200.jpg)
Bad bot traffic skyrockets across the web
Bad bots are automated programs designed with malicious intent to perform various activities on the internet, often causing harm to individuals, organizations, and online …
![gift](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18140248/gift-dark-400x200.jpg)
Hackers employ nuanced tactics to evade detection
Threat actors evolved tactics, opting for a more nuanced approach that spread attacks across a broader timeframe to blend in with legitimate traffic and evade detection during …
![bad bots](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10164708/bad_bots-400x200.jpg)
Cybercriminals turn to ready-made bots for quick attacks
Bots and human fraud farms were responsible for billions of attacks in the H1 of 2023 and into Q3, according to Arkose Labs. These attacks comprised 73% of all website and app …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101941/genai3-400x200.jpg)
Rise in automated attacks troubles ecommerce industry
Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, …
![bots](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10164710/bad_bots2-400x200.jpg)
AI-enabled bots can solve CAPTCHAs faster than humans
Companies are losing revenue in the fight against malicious bot attacks, according to survey by Kasada. Despite spending millions of dollars on traditional bot management …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142001/api3-400x200.jpg)
Is the new OWASP API Top 10 helpful to defenders?
The OWASP Foundation’s Top Ten lists have helped defenders focus their efforts with respect to specific technologies and the OWASP API (Application Programming Interface) …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
Compromised Linux SSH servers engage in DDoS attacks, cryptomining
Poorly managed Linux SSH servers are getting compromised by unknown attackers and instructed to engage in DDoS attacks while simultaneously mining cryptocurrency in the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege