Please turn on your JavaScript for this page to function normally.
Black Hat
What Black Hat USA 2022 attendees are concerned about

Black Hat released its Supply Chain and Cloud Security Risks Are Top of Mind survey. The report highlights important findings from more than 180 of experienced cybersecurity …

week in review
Week in review: Spot deep-faked job candidates, data exfiltration via bookmarks, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Browser synchronization abuse: Bookmarks as a covert data exfiltration …

finance
Threats targeting fintech companies are on the rise

In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and …

patch
August 2022 Patch Tuesday forecast: Printers again?

July 2022 Patch Tuesday came and went quietly as expected. Microsoft addressed 40 CVEs in Windows 11 and 46 CVEs in the Windows 10 set of updates. It was a little unusual …

threat intelligence
Risk astute leadership: Converting intelligence into actionable controls

In this Help Net Security video, John deCraen, Associate Managing Director at Kroll, talks about risk astute leadership and the leveraging of threat intelligence to inform …

MI X
MI-X: Open source project helps you understand whether you are exploitable

In this Help Net Security video, Ofri Ouzan, Security Researcher at Rezilion, talks about MI-X (Am I Exploitable?), an open source tool aimed at effectively determining …

Kubernetes
Organizations grew to love Kubernetes: Usage in production is high

Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they …

Coinbase phishing
Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time

In this video for Help Net Security, Nick Ascoli, VP of Threat Research, PIXM, discusses a multilayered phishing campaign targeting cryptocurrency exchange Coinbase. Attackers …

mobile devices
Businesses lack visibility into run-time threats against mobile apps and APIs

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

Business ideas
6 ways your cloud data security policies are slowing innovation – and how to avoid that

As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to secure …

chess
How can organizations stay ahead of cybersecurity challenges?

The onslaught of ransomware attacks has catapulted cybersecurity to the forefront of global business operations. However, just 36% of mid-sized organizations still don’t have …

ransomware
A third of organizations experience a ransomware attack once a week

Ransomware attacks show no sign of slowing. According to new research published by Menlo Security, a third of organizations experience a ransomware attack at least once a …

Don't miss

Cybersecurity news