Please turn on your JavaScript for this page to function normally.
database
Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the organization’s day-to-day …

open-source cybersecurity tools
33 open-source cybersecurity solutions you didn’t know you needed

Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make …

large language models
AI cybersecurity needs to be as multi-layered as the system it’s protecting

Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden …

video phishing
Phishing in focus: Disinformation, election and identity fraud

The frequency of phishing attacks is rising as attackers increasingly utilize AI to execute more scams than ever before. In this Help Net Security video, Abhilash Garimella, …

cybersecurity budget
End of an era: Security budget growth slows down

Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico …

cybersecurity week in review
Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability allows Yubico security keys to be cloned Researchers have …

patch tuesday
September 2024 Patch Tuesday forecast: Downgrade is the new exploit

September 2024 Patch Tuesday is now live: Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes I asked for a calm August 2024 Patch …

SaaS
Human firewalls are essential to keeping SaaS environments safe

Businesses run on SaaS solutions: nearly every business function relies on multiple cloud-based tech platforms and collaborative work tools like Slack, Google Workspace apps, …

cybercrime cost
The true cost of cybercrime for your business

As cybercriminals continue to refine their methods, blending traditional strategies with new technologies, the financial toll on individuals and organizations has reached …

ransomware
83% of organizations experienced at least one ransomware attack in the last year

Ransomware is an all-too-common occurrence: 83% of organizations have experienced at least one ransomware attack in the last year, 46% of respondents experienced four or more …

Infosec products of the week
New infosec products of the week: September 6, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Binarly, Bitdefender, Prompt Security, Revenera, Skyhigh Security, and Vanta. …

teamwork
How to gamify cybersecurity preparedness

Organizations’ preparedness and resilience against threats isn’t keeping pace with cybercriminals’ advancements. Some CEOs still believe that cybersecurity requires episodic …

Don't miss

Cybersecurity news