CISOs need to consider the personal risks associated with their role
70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their opinion of the role, according…
70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their opinion of the role, according…
FuzzyAI is an open-source framework that helps organizations identify and address AI model vulnerabilities in cloud-hosted and in-house AI models, like guardrail bypassing and harmful…
A significant surge in brute-force attacks targeting Citrix NetScaler devices across multiple organizations. The attacks, primarily originating from a Hong Kong-based cloud provider, are exploiting…
In this Help Net Security interview, Karl Mattson, CISO at Endor Labs, discusses strategies for enhancing secure software development. Mattson covers how developers can address…
Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus Networks, Trellix, and Versa Networks.…
A federal court in St. Louis, Missouri, has indicted 14 North Korean nationals in a sophisticated scheme involving IT workers who allegedly defrauded US companies…
US Bitcoin ATM operator Byte Federal suffered a data breach Pierluigi Paganini December 12, 2024 US Bitcoin ATM operator Byte Federal suffered a data breach…
Explore the professions most vulnerable to cybersecurity threats in 2025, from IT pros to crypto investors. Learn how to stay safe and reduce risks in…
A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems. The…
Learn how cryptocurrency’s rapid growth brings risks like fake payment gateways and online scams. Discover tips to stay safe, avoid theft, and protect your data…
Albanian law enforcement has seized the Rydox cybercrime marketplace and arrested three administrators in collaboration with international partners. Kosovo nationals Ardit Kutleshi, Jetmir Kutleshi, and…
“Politics makes strange bedfellows” is an old saying that apparently applies to hacktivist groups too. In recent days, Cyble threat intelligence researchers have observed pro-Russian…