![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101947/genai1-400x200.jpg)
Security analysts believe more than half of tasks could be automated
Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI …
![ISC2 eBook](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/28165131/lead_in_cybersecurity-ebook-400x200.jpg)
eBook: Do you have what it takes to lead in cybersecurity?
Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in …
![IoT cybersecurity law](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29155710/iot_cybersecurity-law-400x200.webp)
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop …
![Okta](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29125215/okta-1500-400x200.webp)
Okta warns customers about credential stuffing onslaught
Credential stuffing attacks have exploded this April, Okta warns, and advises its customers to use available tools to block access requests originating from residential …
![Pathfinder](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29112839/pathfinder-1500-400x200.webp)
Researchers unveil novel attack methods targeting Intel’s conditional branch predictor
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise …
![DHS](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29103711/us-dhs-1500-1-400x200.webp)
DHS establishes AI Safety and Security Board to protect critical infrastructure
The Department of Homeland Security announced the establishment of the Artificial Intelligence Safety and Security Board (the Board). The Board will advise the Secretary, the …
![Prompt Fuzzer](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/21135943/prompt_fuzzer-1500-400x200.webp)
Prompt Fuzzer: Open-source tool for strengthening GenAI apps
Prompt Fuzzer is an open-source tool that evaluates the security of your GenAI application’s system prompt against dynamic LLM-based threats. Prompt Fuzzer features …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25125028/ai-genai-2-1500-400x200.webp)
AI is creating a new generation of cyberattacks
Most businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20081204/computer_skills-400x200.jpg)
Closing the cybersecurity skills gap with upskilling programs
The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and …
![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25124832/cybersecurity-week-review-2-1500-400x200.webp)
Week in review: Two Cisco ASA zero-days exploited, MITRE breach, GISEC Global 2024
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, …
![passwords](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/02181832/passwords-2-400x200.jpg)
Most people still rely on memory or pen and paper for password management
Bitwarden surveyed 2,400 individuals from the US, UK, Australia, France, Germany, and Japan to investigate current user password practices. The survey shows that 25% of …
![LSA Whisperer](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/18154559/lsa-whisperer-1500-400x200.webp)
LSA Whisperer: Open-source tools for interacting with authentication packages
LSA Whisperer consists of open-source tools designed to interact with authentication packages through their unique messaging protocols. Support is currently provided for the …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints