Please turn on your JavaScript for this page to function normally.
search
CISOs say they’re prepared, their data says otherwise

Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius …

cyber risks
Why 90% of cyber leaders are feeling the heat

90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of AI and expanding attack surfaces, according to BitSight. These …

Aayush Choudhury
Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, …

AI
Your employees uploaded over a gig of files to GenAI tools last quarter

In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings confirm that sensitive …

ransomware
Ransomware groups shift to quadruple extortion to maximize pressure

Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware …

Marc Frankel
AIBOMs are the new SBOMs: The missing link in AI risk management

In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to …

data breach
Average global data breach cost now $4.44 million

IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations …

Rohan Sen
Smart steps to keep your AI future-ready

In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong …

water management cybersecurity
It’s time to sound the alarm on water sector cybersecurity

A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean water supply can have serious public health and safety …

AI threats
What attackers know about your company thanks to AI

In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key …

Smartphone in chains
Security gaps still haunt shared mobile device use in healthcare

Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still …

key
Why stolen credentials remain cybercriminals’ tool of choice

It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools