Help Net Security
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
Linux malware backdoors supercomputers
ESET researchers discovered Kobalos, a malware that has been attacking supercomputers – high performance computer (HPC) clusters – as well as other targets such as a …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093155/ransomware-400x200.jpg)
SMB ransomware extortion: Identifying pieces of the puzzle
2020 saw a new trend emerge: ransomware victims who were unwilling or unable to pay the ransom were faced with the threat of their sensitive information being exposed. Ponying …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
Digital transformation plans have accelerated due to the pandemic
As organizational reliance on data continues to rise amid the pandemic, a Druva survey uncovered rising concerns among Indian businesses about data protection, the growing …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101722/laptop-400x200.jpg)
The first step in protecting ourselves is realizing that there’s a lot we can do to stay safe online
While the shift to a digital-first life was brought on by the global pandemic, U.S. consumers plan to keep it up – with online banking (61%), social engagements (56%), and …
![CCAPS](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/27114051/ccaps-400x200.jpg)
CCAPS: New cybersecurity category that protects households and small businesses
We’re increasingly reliant on our networks to keep us working, entertained and connected to our loved ones. Networks ensure our kids get an education and have smart new toys …
![BitDam](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/01145655/bitdam_playbook-400x200.jpg)
Download: The Phisher’s Playbook
The constant increase in phishing attacks and the damage they cause make all of us anxious, especially since they’re becoming harder to detect. To protect yourself from …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105020/hands-400x200.jpg)
To combat cyber warfare the security industry needs to work together
Just when we thought 2020 couldn’t get worse, security firm FireEye broke the news that the compromise of a software solution by IT solutions provider SolarWinds had resulted …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Board members aren’t taking cybersecurity as seriously as they should
Trend Micro shared results from a study that reveals systemic challenges with security integration into business processes. The report includes the top ways to drive …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
New value exists at the intersection of digital tech and sustainability
European companies that accelerate both their digital and sustainability transitions are likely to recover faster and emerge stronger from the COVID-19 crisis, according to a …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
5G core market size to reach $9.497 million by 2025
The global 5G core market size is projected to grow from $630 million in 2020 to $9.497 million by 2025, at a CAGR of 72.0% during the forecast period, according to …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
How consumers protect sensitive information when using FinTech apps
42% of global consumers use a free FinTech app or platform. Of those, 50% do not know if the app they use sells their data. ESET has explored the topic of data security in the …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing
Here’s an overview of some of last week’s most interesting news and articles: “Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library Libgcrypt …