Help Net Security
Why automated pentesting won’t fix the cybersecurity skills gap
The modern threat landscape is an enormous challenge for the modern enterprise. Many organizations are “addressing” this by buying the newest security products from the latest …
Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …
58% of IT leaders worried their business could become a target of rising nation state attacks
HP Wolf Security released the findings of a global survey of 1,100 IT decision makers (ITDMs), examining their concerns around rising nation state attacks. 72% of respondents …
ICS vulnerabilities disclosed in H1 2021 rose by 41%
Industrial control system (ICS) vulnerability disclosures are drastically increasing as high-profile cyberattacks on critical infrastructure and industrial enterprises have …
Key email threats and the high cost of BEC
Area 1 Security published the results of a study analyzing over 31 million threats across multiple organizations and industries, with new findings and warnings issued by …
The impact of eCommerce fraud on retailers and shoppers
There’s a stark disconnect between retailers and shoppers on the matter of eCommerce fraud, Riskified reveals. The research, which comprised 4,000 consumers and 400 …
Colocation services market to grow steadily over the next 5 to 7 years
The global colocation services market continues to maintain its growth streak through the pandemic and is expected to continue on a high growth trajectory over the next 5 to 7 …
eBook: The Psychology of Cyber
‘Mega breaches’ might sound dystopian, but they’re becoming an all too familiar feature of the modern cyber crisis. Yet organizations are still relying on …
Week in review: Realtek chips vulnerabilities, NAS devices under attack, security teams burnout
Here’s an overview of some of last week’s most interesting news, articles and interviews: NAS devices under attack: How to keep them safe? Network-attached storage …
If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?
Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No …
Attackers rapidly adopting new techniques to target users
Zix announced the release of a report which finds attackers are rapidly adopting new techniques to target users. “Cybercrime is exploding in 2021 and if there is anything that …
A full return to the office is more likely once the pandemic ends
While many U.S. professionals are embracing hybrid work arrangements, a research from Robert Half shows a majority of companies anticipate a full return to the office once the …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)