Please turn on your JavaScript for this page to function normally.
humanoid robot
Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that …

biometrics
The password problem we keep pretending to fix

Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. …

ics cybersecurity
A safer way to break industrial systems (on purpose)

Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a …

AI
Building trust in AI-powered security operations

In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He …

healthcare
The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without …

critical infrastructure
The power grid is getting old, and so is the cybersecurity protecting it

Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, …

solar power
The solar power boom opened a backdoor for cybercriminals

Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in …

investment
Security validation: The key to maximizing ROI from security investments

Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern enterprise’s cyber defenses. …

Wayman Cummings
Building a healthcare cybersecurity strategy that works

In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He …

AI
AI-generated images have a problem of credibility, not creativity

GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada …

OT
The five-minute guide to OT cyber resilience

In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote …

hospital
When hackers hit, patient safety takes the fall

93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools