Please turn on your JavaScript for this page to function normally.
BEC scams
How BEC attacks on human capital management systems are increasing

In this Help Net Security video, Jon Hencinski, VP of Security Operations at Expel, talks about how their SOC team has recently observed Business Email Compromise (BEC) …

Stellar Cyber Open XDR
Product showcase: The Stellar Cyber Open XDR platform

As enterprises find themselves dealing with ever-increasing threats and the boundaries of their organization disappearing, security teams are more challenged than ever to …

hardware
How automation can solve application development challenges

Security Compass has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their …

tools
Outdated infrastructure not up to today’s ransomware challenges

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …

coronavirus
COVID-19 data put for sale on the Dark Web

Resecurity, a California-based cybersecurity company protecting Fortune 500, has identified leaked PII stolen from Thailand’s Department of Medical Sciences containing …

NetworkManager
NetworkManager 1.40 released, features 600 patches

NetworkManager attempts to keep an active network connection available at all times. The point of NetworkManager is to make networking configuration and setup as painless and …

Data
Data security hinges on clear policies and automated enforcement

In 2003, California became the first U.S. state to require and implement a series of data breach notification laws designed to protect against the misuse of residents’ …

airplane
The complexity of modern aircraft cybersecurity

Modern aircraft are more connected now than they ever have been. The results have been rewards like faster flight turnarounds, greater fuel efficiency, and more comfortable …

People
Creating cyber career opportunities during the talent shortage

With roughly 700,000 cybersecurity positions open, businesses across America are feeling the direct impact of the cyber talent shortage. As ransomware attacks and data …

hospital
Attackers changing targets from large hospitals to specialty clinics

Critical Insight announced the release of the firm’s H1 2022 Healthcare Data Breach Report, which analyzes ​​breach data reported to the United States Department of Health and …

IoT
Rise in IoT vulnerability disclosures, up 57%

Vulnerability disclosures impacting IoT devices increased by 57% in the first half (1H) of 2022 compared to the previous six months, according to a research by Claroty. The …

week in review
Week in review: RCE bug in GitLab patched, phishing PyPI users, Escanor malware in MS Office docs

Thoma Bravo: Securing digital identities has become a major priority In this Help Net Security interview, Andrew Almeida, Partner on the Flagship team at Thoma Bravo, talks …

Don't miss

Cybersecurity news