cybersecurity
Bad bots are coming at APIs! How to beat the API bot attacks?
API or Application Programming Interface is a de facto building block for modern-day applications, necessary for both building and connecting applications and websites. But …
MSPs and cybersecurity: The time for turning a blind eye is over
Results of a Vade report highlight the prevalence of Managed Service Providers (MSPs), with 96% of organizations either currently outsourcing at least some of their needs to …
Most IT leaders think partners, customers make their business a ransomware target
Global organizations are increasingly at risk of ransomware compromise via their extensive supply chains. During May and June 2022 Sapio Research polled 2,958 IT …
Defeat social engineering attacks by growing your cyber resilience
In this Help Net Security video, Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions, discusses the innovation behind social engineering campaigns …
Go-Ahead cyberattack might derail UK public transport services
One of the UK’s largest public transport operators, Go-Ahead Group, has fallen victim to a cyberattack. The Go-Ahead Group, which connects people across its bus and rail …
Ransomware remains the number one threat to businesses and government organizations
Acronis researchers have concluded that ransomware continues to be the number one threat to large and medium-sized businesses, including government organizations. This Help …
Your vendors are likely your biggest cybersecurity risk
As speed of business increases, more and more organizations are looking to either buy companies or outsource more services to gain market advantage. With organizations …
Companies underestimate number of SaaS applications in their environment
A new research study focused on SaaS usage among enterprises across the USA, UK, and Europe, highlights a striking difference between consumption and security of SaaS …
Development of secure software now an imperative for global DevOps teams
GitLab released the results of its annual DevSecOps survey which highlights the continued prioritization of security and compliance, investment in toolchain consolidation, and …
7 metrics to measure the effectiveness of your security operations
Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going …
How Just-in-Time privilege elevation prevents data breaches and lateral movement
Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile …
Does your cybercrime prevention program work?
KELA surveyed 400 security team members in the US who were responsible for gathering cybercrime threat intelligence daily to better understand if they’re proactively scanning …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services