How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed to att… Continue reading How a fake ICS network can reveal real cyberattacks

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their system… Continue reading Creating a compliance strategy that works across borders

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the lessons that can be learned from leading regions. He points out that good engineering usually leads to strong security… Continue reading Building security that protects customers, not just auditors

Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is growing as A… Continue reading Most enterprise AI use is invisible to security teams

Your heartbeat could reveal your identity, even in anonymized datasets

A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to individuals. Researchers were able to re-identify people in anonymous datasets with surprising accuracy, raising questions abo… Continue reading Your heartbeat could reveal your identity, even in anonymized datasets

Ransomware, vendor outages, and AI attacks are hitting harder in 2025

Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these forces are playing out in real-world incidents and how they are changing the … Continue reading Ransomware, vendor outages, and AI attacks are hitting harder in 2025

When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht University, and other ins… Continue reading When typing becomes tracking: Study reveals widespread silent keystroke interception

How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations range… Continue reading How attackers weaponize communications networks

AI agents are here, now comes the hard part for CISOs

AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that 52% of or… Continue reading AI agents are here, now comes the hard part for CISOs

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal

Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories represent 34 c… Continue reading Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal