Please turn on your JavaScript for this page to function normally.
leaders
Strategies for security leaders: Building a positive cybersecurity culture

Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly …

Kyle Wickert
AI for application security: Balancing automation with human oversight

In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application security, exploring how it’s …

deepfakes
Organizations turn to biometrics to counter deepfakes

The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, …

phishing
Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according …

digital wallet
Stolen, locked payment cards can be used with digital wallet apps

Fraudsters can add stolen payment cards to digital wallet apps and continue making online purchases even after victims report the card stolen and the bank replaces it, …

azure front door
Mandatory MFA for Azure sign-ins is coming

Microsoft is making multi-factor authentication (MFA) – “one of the most effective security measures available” – mandatory for all Azure sign-ins. …

visualization
To improve your cybersecurity posture, focus on the data

Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards exist within siloed systems and …

x64dbg
x64dbg: Open-source binary debugger for Windows

x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to the source code. It offers a wide …

security
Protecting academic assets: How higher education can enhance cybersecurity

Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support …

API
Common API security issues: From exposed secrets to unauthorized access

Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many …

cybersecurity week in review
Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200) A …

Google malicious ads
Tech support scammers impersonate Google via malicious search ads

Google Search ads that target users looking for Google’s own services lead them to spoofed sites and Microsoft and Apple tech support scams. The fake Google Search ads …

Don't miss

Cybersecurity news