Please turn on your JavaScript for this page to function normally.
Vulnerability
Critical vulnerabilities persist in high-risk sectors

Finance and insurance sectors found to have the highest number of critical vulnerabilities, according to Black Duck. Finance and insurance industry faces highest …

Infosec products of the week
New infosec products of the week: November 15, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra …

Android Scam Detection
Google launches on-device AI to alert Android users of scam calls in real-time

Google has announced new security features for Android that provide real-time protection against scams and harmful apps. These features, powered by advanced on-device AI, …

identity
What 2025 holds for user identity protection

In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: …

risk management
How cybersecurity failures are draining business budgets

Security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to …

malware
Infostealers increasingly impact global security

Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant …

AI
Cyber professionals face an IP loss reckoning in 2025

AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI …

online fraud
Social engineering scams sweep through financial institutions

North American financial institutions fielded 10 times more reports of social engineering scams in 2024 than they did a year ago, according to BioCatch. The data shows scams …

identity, face, code, privacy, person
The changing face of identity security

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find …

Powerpipe
Powerpipe: Open-source dashboards for DevOps

Powerpipe is an open-source solution designed to streamline DevOps management with powerful visualization and compliance tools, making it simple to track, assess, and act on …

cybersecurity regulations
Ambitious cybersecurity regulations leave companies in compliance chaos

While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also …

CGRC
The Ultimate Guide to the CGRC

Even the brightest minds benefit from guidance on the journey to success. The Ultimate Guide covers everything you need to know about Certified in Governance, Risk and …

Don't miss

Cybersecurity news