Please turn on your JavaScript for this page to function normally.
Planning
Majority of SMBs lack 24/7 security operations to detect threats

Cybercriminals and threat actors work around the clock, with attacks originating from around the world. Therefore, all businesses, including SMBs, need to be always on alert …

AWSGoat
AWSGoat: Easy to deploy vulnerable AWS infrastructure for pentesters

Compromising an organization’s cloud infrastructure is like sitting on a gold mine for attackers. And sometimes, a simple misconfiguration or a vulnerability in web …

identity
Identity is the killer context: 4 ways to stay in control

The COVID-19 pandemic sounded the death knell for the traditional perimeter. Work is now an activity, not a place, meaning the concept of an encircling wall of security is as …

abstract
36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet

A significant percentage of organizations expose insecure or highly sensitive protocols, including SMB, SSH, and Telnet, to the public internet, the ExtraHop Benchmarking …

Hand
LogoKit update: The phishing kit leveraging open redirect vulnerabilities

Resecurity identified threat actors leveraging open redirect vulnerabilities in online services and apps to bypass spam filters to ultimately deliver phishing content. Using …

ransomware
Three ransomware gangs consecutively attacked the same network

Hive, LockBit and BlackCat, three prominent ransomware gangs, consecutively attacked the same network, according to Sophos. The first two attacks took place within two hours, …

dark
Cyber syndicates are working with amateur attackers to target businesses

Cybercrime is being supercharged through “plug and play” malware kits that make it easier than ever to launch attacks. Cyber syndicates are collaborating with amateur …

Titan M
Dissecting Google’s Titan M chip: Vulnerability research challenges

The enterprise-grade Titan M security chip was custom built to help protect data. Derived from the same chip Google uses to protect its cloud data centers, it handles …

Security
Enterprises are actively consolidating security vendors and integrating technologies

Driven by security operations complexity, 46% of organizations are consolidating or plan on consolidating the number of vendors they do business with. As a result of this …

organize
5 key things we learned from CISOs of smaller enterprises survey

As business begins its return to normalcy (however “normal” may look), CISOs at small and medium-size enterprises (500 – 10,000 employees) were asked to share their …

connection
Businesses are struggling to balance security and end-user experience

Modern organizations are challenged by conflicting demands to secure the enterprise while delivering excellent end-user experience, according to Broadcom Software. This Help …

ransomware payments
Could criminalizing ransomware payments put a stop to the current crime wave?

In this Help Net Security video, Charl van der Walt, Head of Security Research, Orange Cyberdefense, discusses whether criminalizing ransomware payments could quell the …

Don't miss

Cybersecurity news