Please turn on your JavaScript for this page to function normally.
AI
How attackers poison AI tools and defenses

Cyberattackers are using generative AI to draft polished spam, create malicious code and write persuasive phishing lures. They are also learning how to turn AI systems …

CISO
The CISO’s guide to stronger board communication

In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs …

cybersecurity week in review
Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How Juventus protects fans, revenue, and reputation during matchdays In this …

human defenders
How agentic AI is changing the SOC

In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC). He explains what agentic AI is, how it …

arrows
Building AI responsibly from day one

In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of ethics and safety in AI development. He explains why …

lock
Gartner: Preemptive cybersecurity to dominate 50% of security spend by 2030

By 2030, preemptive cybersecurity solutions will account for 50% of IT security spending, up from less than 5% in 2024, replacing standalone detection and response (DR) …

AI
AI needs ethics to avoid real-world harm

In this Help Net Security video, Brittany Allen, Senior Trust and Safety Architect at Sift, explores how the rise of AI agents is creating new fraud risks. She explains how …

OpenID Foundation
OpenID Foundation sets new standards for real-time security event sharing

The OpenID Foundation (OIDF) has approved three Final Specifications, establishing the first global standards for real-time security event sharing across digital identity …

cybersecurity week in review
Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is invisible to security teams Most enterprise AI …

russian flag
Researchers believe Gamaredon and Turla threat groups are collaborating

ESET Research has discovered evidence of collaboration between the Gamaredon and Turla threat groups. Both groups are linked to Russia’s primary intelligence agency, the FSB, …

EU
The real-world effects of EU’s DORA regulation on global businesses

In this Help Net Security video, Matt Cooper, Director of Governance, Risk, and Compliance at Vanta, discusses the EU’s Digital Operational Resilience Act (DORA) and its …

Exaforce
Product showcase: Exaforce – The full lifecycle AI SOC platform

Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools