Please turn on your JavaScript for this page to function normally.
email attacks
Threat actors are stepping up their tactics to bypass email protections

Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the …

teamwork
Why cyber tools fail SOC teams

A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. …

passwords
The state of password security in 2024

In this Help Net Security video, John Bennett, CEO at Dashlane, discusses their recent Global Password Health Score Report, detailing the global state of password health and …

botnet
Adversarial groups adapt to exploit systems in new ways

In this Help Net Security video, Jake King, Head of Threat & Security Intelligence at Elastic, discusses the key findings from the 2024 Elastic Global Threat Report. …

quantum computing
How to fend off a quantum computer attack

In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack.

cyber insurance
Facing the uncertainty of cyber insurance claims

Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty …

cloud
Evolving cloud threats: Insights and recommendations

Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by …

attack
Evolving cybercriminal tactics targeting SMBs

A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net …

cybercriminals video
Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly …

AI
AI data collection under fire

A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial …

API
The dark side of API security

APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security …

Europe
DORA regulation’s nuts and bolts

The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in …

Don't miss

Cybersecurity news