Security

Money mule networks evolve into hierarchical, business-like criminal enterprises – Help Net Security
In this Help Net Security interview, Michal Tresner, CEO of ThreatMark, discusses how cybercriminals are weaponizing AI, automation, and social engineering to industrialize money mule operations. He looks at how these networks have changed and how behavioral intelligence is helping to catch fraud. Tresner also shares practical tips for CISOs trying to stop mule activity…

7 security risks you need to know when using AI for work
Are you using artificial intelligence at work yet? If you’re not, you’re at serious risk of falling behind your colleagues, as AI chatbots, AI image generators, and machine learning tools are powerful productivity boosters. But with great power comes great responsibility, and it’s up to you to understand the security risks of using AI at…

How CISOs can justify security investments in financial terms – Help Net Security
In this Help Net Security interview, John Verry, Managing Director at CBIZ, discusses how insurers and financial risk professionals evaluate cybersecurity maturity through different lenses. He also shows how framing cyber risk in business terms can strengthen investment cases and elevate cybersecurity as a strategic driver. What should CISOs know about how insurers and financial…

Why AI code assistants need a security reality check – Help Net Security
In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants are transforming development workflows and impacting security. He explains how these tools can boost productivity but may also propagate vulnerabilities if not properly reviewed. What security risks do AI code assistants pose that developers and…

Week in review: Microsoft fixes exploited zero-day, Mirai botnets target unpatched Wazuh servers – Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)Two Mirai botnets are exploiting a critical…

Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security
Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report on the fallout from that investigation finds this dark ad tech industry is far more…

Security Precautions to Take While Traveling | Computer Hardware
When we think about digital and device security, we mostly think about the fixed locations where people spend most of their time—home, school, and work. But what about when you’re traveling? Some security concerns remain the same when you’re on the road, but new ones crop up. We’ll assume that you already keep your devices…

How to secure your phone before attending a protest
Back in June 2020, when this article was first written, people were taking to the streets to organize for justice and protest against systemic racism and police brutality. There have been several other flashpoints for protests since then (for example, when the Supreme Court overturned Roe v. Wade), but the recent activities of ICE, especially…

The legal questions to ask when your systems go dark – Help Net Security
At Span Cyber Security Arena, I sat down with Iva Mišković, Partner at the ISO-certified Mišković & Mišković law firm, to discuss the role of legal teams during cyber incidents. She shared why lawyers should assume the worst, coordinate quickly, and ask the right questions to support IT. Mišković explained that a legal strategy, built…

How MCP Agents Help SaaS Security Teams Automate SOC 2 & HIPAA
Introduction Security and compliance teams at fast-growing SaaS companies are under constant pressure. Whether it’s a SOC 2 audit, HIPAA documentation, or staying updated with GDPR regulations, the compliance burden keeps growing—while the margin for error keeps shrinking. Despite having robust DevSecOps practices and cloud security tools in place, many teams still rely on spreadsheets,…