![QR code](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09155644/qrcode-1400-400x200.jpg)
Image-based phishing tactics evolve
While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, …
![Eye](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/07114030/eye-1500-400x200.webp)
How new and old security threats keep persisting
Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Security …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/06183436/ai-1500-400x200.webp)
Today’s biggest AI security challenges
98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to …
![connections](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142123/computer-connections-400x200.jpg)
78% of MSPs identify cybersecurity as prime IT challenge
Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165910/ai-person-400x200.png)
AI tools put companies at risk of data exfiltration
Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating …
![software bug](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/08155002/software_bug-400x200.jpg)
Organizations are knowingly releasing vulnerable applications
92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers …
![cybersecurity staff compensation](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29085111/cybersecurity_staff-_compensation-400x200.webp)
New compensation trends in the cybersecurity sector
For several years, cybersecurity leaders have grappled with talent shortages in crucial cyber roles. In the face of escalating financial requirements and expanding …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24144150/usa-flag-1-400x200.jpg)
Businesses foresee major impact from new SEC cybersecurity disclosure rules
While 98% of security professionals and executives have started working to comply with the new U.S. Securities and Exchange Commission (SEC) cybersecurity disclosure ruling, …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120648/cloud_security-1-400x200.jpg)
Cryptojacking is no longer the sole focus of cloud attackers
As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in sophistication and number – a collective effort to safeguard both …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152205/botnet-1400-3-400x200.jpg)
Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT
76% of enterprises lack sufficient voice and messaging fraud protection as AI-powered vishing and smishing skyrocket following the launch of ChatGPT, according to Enea. …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27124629/ai-eye-1400-400x200.webp)
How AI is reshaping the cybersecurity job landscape
88% of cybersecurity professionals believe that AI will significantly impact their jobs, now or in the near future, and 35% have already witnessed its effects, according to …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27110446/insider-threat-1500-400x200.webp)
AI in cybersecurity presents a complex duality
Companies more than ever view GRC (Governance, Risk, and Compliance) as a holistic process and are taking steps toward getting a complete view of their risk environment and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD