Please turn on your JavaScript for this page to function normally.
Vulnerability
The case for enterprise exposure management

For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to …

Tim West
How ransomware tactics are shifting, and what it means for your business

In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these …

Bot
Keeping up with automated threats is becoming harder

98% of organizations attacked by bots in the past year lost revenue as a result, according to Kasada. Web scraping (web crawling) is a significant threat followed closely by …

cybersecurity threats
Cyber threats that shaped the first half of 2024

Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first …

BlackByte ransomware
BlackByte affiliates use new encryptor and new TTPs

BlackByte, the ransomware-as-a-service gang believed to be one of Conti’s splinter groups, has (once again) created a new iteration of its encryptor. “Talos …

CrowdStrike, Delta
Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?

In a potentially groundbreaking dispute, Delta Air Lines is threatening to sue CrowdStrike, a leading cybersecurity firm, for alleged negligence and breach of contract. This …

botnet
Current attacks, targets, and other threat landscape trends

In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in …

USA
AI-fueled phishing scams raise alarm ahead of U.S. presidential election

Highlighting growth of phishing and digital scams targeting United States citizens, Bolster released a research that identified 24 separate nation-state threat actor groups …

Grant Geyer
Securing remote access to mission-critical OT assets

In this Help Net Security interview, Grant Geyer, Chief Strategy Officer at Claroty, discusses the prevalent vulnerabilities in Windows-based engineering workstations (EWS) …

strategy
CISOs must shift from tactical defense to strategic leadership

Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the …

breach
Only 13% of organizations are cyber mature

A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for …

quantum computing
Preparing for Q-Day as NIST nears approval of PQC standards

Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely …

Don't miss

Cybersecurity news