Ransomware groups shift to quadruple extortion to maximize pressure
Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach,...
Read more →Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach,...
Read more →In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large...
Read more →SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded...
Read more →Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all...
Read more →In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered...
Read more →CW – OT Security Officer SSE | United Kingdom | On-site – View job details As a CW – OT...
Read more →Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025....
Read more →Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The...
Read more →In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training...
Read more →IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance....
Read more →Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms....
Read more →Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according...
Read more →