phishing
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145250/laptop-data2-400x200.png)
The growing challenge of cyber risk in the age of synthetic media
As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. …
![Jayson E. Street](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19122041/jayson_e_street-2-secure_yeti-400x200.jpg)
Social engineer reveals effective tricks for real-world intrusions
In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Breaking down the state of authentication
In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey …
![Qakbot](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/30133913/qakbot-hns-400x200.jpg)
Qakbot returns in fresh assault on hospitality sector
The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing …
![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
Digital ops and ops management security predictions for 2024
CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI at everyone’s mind. Instead of playing catch-up regarding …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20122800/microsoft-storm-400x200.jpg)
Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns
Attackers are compromising high-privilege Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks. Abusing OAuth applications …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
What custom GPTs mean for the future of phishing
OpenAI is putting more power into the hands of users of GenAI, allowing them to create their custom AI agents without writing code. These custom GPTs are the latest leap …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03110956/email-400x200.jpg)
Organizations can’t ignore the surge in malicious web links
Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/22092809/okta2-400x200.jpg)
Okta breach: Hackers stole info on ALL customer support users
The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142233/keys3-400x200.jpg)
MFA under fire, attackers undermine trust in security measures
In this Help Net Security video, Renée Burton, Head of Threat Intelligence at Infoblox, discusses MFA attacks. MFA adds security to online accounts, but MFA lookalikes are a …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
AI disinformation campaigns pose major threat to 2024 elections
AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/09170820/ai-brain-400x200.jpg)
Data protection demands AI-specific security strategies
Adoption and use of AI tools is high across organizations, however many are concerned about the impacts AI will have on their larger data security strategy, according to …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege