![connections](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142123/computer-connections-400x200.jpg)
78% of MSPs identify cybersecurity as prime IT challenge
Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing …
![Prison](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29143510/prison-jail-400x200.webp)
A cybercriminal is sentenced, will it make a difference?
The darknet is home to many underground hacking forums in which cybercriminals convene, freely sharing stories, tactics, success stories and failures. Their unguarded …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/01103727/apple-room-400x200.jpg)
Apple fixes two actively exploited iOS zero-days (CVE-2024-23225, CVE-2024-23296)
Apple has fixed two iOS zero-day vulnerabilities (CVE-2024-23225, CVE-2024-23296) exploited by attackers in the wild. CVE-2024-23225 and CVE-2024-23296 On Tuesday, Apple …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142004/api1-400x200.jpg)
5 ways to keep API integrations secure
API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment card …
![RiskInDroid](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29100746/riskindroid-1500-400x200.webp)
RiskInDroid: Open-source risk analysis of Android apps
RiskInDroid (Risk Index for Android) is an open-source tool for quantitative risk analysis of Android applications based on machine learning techniques. How RiskInDroid works …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23151629/plan-governance-400x200.jpg)
How to create an efficient governance control program
Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165910/ai-person-400x200.png)
AI tools put companies at risk of data exfiltration
Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29115745/email-attack-400x200.jpg)
Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes
A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments to steal …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
Why cyber maturity assessment should become standard practice
Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help …
![free data protection regulation courses](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/04104038/free_data_protection_regulation_courses-1500-400x200.webp)
3 free data protection regulation courses you can take right now
Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and linked with other data in a manner that may …
![Kris Lovejoy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16135002/kris_lovejoy-2-kyndryl-1-400x200.jpg)
What organizations need to know about the Digital Operational Resilience Act (DORA)
In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on …
![software bug](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/08155002/software_bug-400x200.jpg)
Organizations are knowingly releasing vulnerable applications
92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers …
Featured news
Sponsored
Don't miss
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation