![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03114206/brain-400x200.jpg)
AI outsourcing: A strategic guide to managing third-party risks
In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this …
![free digital forensics tools](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/14100246/free_digital_forensics_tools-1400-400x200.jpg)
5 free digital forensics tools to boost your investigations
Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28082148/malware_fire-400x200.jpg)
Understanding the tactics of stealthy hunter-killer malware
Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
AI PC shipments are expected to surpass 167 million units by 2027
Shipments of AI PCs – personal computers with specific system-on-a-chip (SoC) capabilities designed to run generative AI tasks locally – are expected to grow from nearly 50 …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14123407/ai-robots-400x200.jpg)
How are state-sponsored threat actors leveraging AI?
Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations. Threat actors …
![QNAP](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12101710/qnap-1-400x200.jpg)
QNAP fixes OS command injection flaws affecting its NAS devices (CVE-2023-47218, CVE-2023-50358)
QNAP Systems has patched two unauthenticated OS command injection vulnerabilities (CVE-2023-47218, CVE-2023-50358) in various versions of the operating systems embedded in the …
![AnyDesk](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/03190113/anydesk-1400-400x200.jpg)
Corporate users getting tricked into downloading AnyDesk
Hackers are leveraging the AnyDesk remote desktop application in a phishing campaign targeting employees, Malwarebytes warns. The AnyDesk phishing campaign In a phishing …
![mental health](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165903/mental_health-400x200.png)
We can’t risk losing staff to alert fatigue
The oft-quoted Chinese military strategist Sun Tzu famously claimed: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Exchange …
![Matt Shelton](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16111231/matt_shelton-2-google-1-400x200.jpg)
Rise in cyberwarfare tactics fueled by geopolitical tensions
In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides …
![Fabric](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/12085024/fabric-open-source-ai-framework-400x200.jpg)
Fabric: Open-source framework for augmenting humans using AI
Fabric is an open-source framework, created to enable users to granularly apply AI to everyday challenges. Key features “I created it to enable humans to easily augment …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09160444/robot-ai-red-400x200.jpg)
Cybercriminals get productivity boost with AI
While AI technology has the potential to streamline and automate processes for beneficial outcomes, it also comes with an equal number of risks to data protection, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131850/lock-texture-400x200.jpg)
Threat actors intensify focus on NATO member states
Initial access brokers (IABs) are increasingly targeting entities within NATO member states, indicating a persistent and geographically diverse cyberthreat landscape, …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?