Please turn on your JavaScript for this page to function normally.
healthcare data
Biotech platforms keep missing the mark on security fundamentals

A new security posture report on the biotech sector shows how quickly attackers could reach sensitive health data with only basic reconnaissance. Researchers needed less than …

Western Digital
Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247)

Western Digital has fixed a critical remote code execution vulnerability (CVE-2025-30247) in the firmware powering its My Cloud network-attached storage (NAS) devices, and has …

data analytics
GenAI is exposing sensitive data at scale

Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and risky sharing practices are creating …

Marco Goldberg
Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how …

data analytics
Static feeds leave intelligence teams reacting to irrelevant or late data

Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need …

heartbeat ECG
Your heartbeat could reveal your identity, even in anonymized datasets

A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to individuals. Researchers were able to re-identify …

website keystroke tracking
When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a …

Gregory Richardson
How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He …

AI
AI is everywhere, but scaling it is another story

AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They …

identity
Identity management was hard, AI made it harder

Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven …

Brain
AI moves fast, but data security must move faster

Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and …

online shopping data risks
How to reclaim control over your online shopping data

Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools