AI-driven threats are heading straight for the factory floor

In this Help Net Security interview, Natalia Oropeza, Chief Cybersecurity Officer at Siemens, discusses how industrial organizations are adapting to a shift in cyber risk driven by AI. She... Read more »

Why bug bounty schemes have not led to secure software

Computer Weekly speaks to Katie Moussouris, security entrepreneur and bug bounty pioneer, about the life of security researchers, bug bounties and the artificial intelligence revolution Read more »

AI agents break rules in unexpected ways

AI agents are starting to take on tasks that used to be handled by people. These systems plan steps, call tools, and carry out actions without a person approving... Read more »

New image signature can survive cropping, stop deepfakes from hijacking trust

Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines... Read more »

The simple shift that turns threat intel from noise into real insight

In this Help Net Security video, Alankrit Chona, CTO at Simbian, explains how security teams can put threat intelligence to work in a way that supports detection, response, and... Read more »

Cybersecurity jobs available right now: December 9, 2025

Associate Analyst, Cyber Threat Intelligence Sony | USA | Remote – View job details As an Associate Analyst, Cyber Threat Intelligence, you will collect and analyze open-source threat data... Read more »

FinCEN data shows $4.5B in ransomware payments, record spike in 2023

Ransomware payments reported to FinCEN exceeded $4.5B by 2024, with 2023 marking a record year at $1.1B across 1,512 incidents. FinCEN analyzed ransomware trends using Bank Secrecy Act (BSA)... Read more »

FBI: Crooks manipulate online photos to fuel virtual kidnapping ransoms

The FBI warns of criminals altering images shared on social media and using them as fake proof of life photos in virtual kidnapping ransom scams. The FBI warns that... Read more »

Ethical hackers can be heroes: It’s time for the law to catch up

The UK government’s plan to finally rewrite the 1990 Computer Misuse Act to provide much-needed legal protections for ethical hackers is welcome, but now we need firm action. Read more »

Google Confirms Rising ‘Account Takeovers ’— Users Told to Check Chrome Settings

Google warns Chrome users of rising “account takeovers” and urges stronger authentication to keep accounts and synced data safe. The post Google Confirms Rising ‘Account Takeovers ’— Users Told... Read more »
Subscribe to our Newsletter