Help Net Security
![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094054/kali-linux-400x200.jpg)
Week in review: Kali Linux 2020.3, mobile security threats, ISO certs at risk of lapsing
Here’s an overview of some of last week’s most interesting news and articles: Updated cryptojacking worm steals AWS credentials A malicious cryptocurrency miner …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Brand impersonation is a go-to tactic for attackers, especially for credential phishing and BEC attacks
Trends in BEC and email security during Q2 2020 included a peaking and plateauing of COVID-19-themed email attacks, an increase in BEC attack volume and acceleration of …
![mobile devices](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112718/mobile_devices-400x200.jpg)
Know the threats to mobile security
Where there’s money, there’s also an opportunity for fraudulent actors to leverage security flaws and weak entry-points to access sensitive, personal consumer …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Global public cloud services market grew 26% YOY in 2019 with revenues totaling $233.4 billion
The worldwide public cloud services market, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), grew 26% year over …
![reload](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102722/reload-400x200.jpg)
Save-to-transform as a catalyst for embracing digital disruption
Organizations that invest in key capabilities today to navigate a post COVID-19 business environment can position themselves to thrive in the “next normal”, …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
What enterprises should consider when it comes to IoT security
Many enterprises have realized that the IoT presents tremendous business opportunities. The IoT can help businesses stay agile in changing situations and maintain a high level …
![UCI research](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19123820/uci-research-sp-400x200.jpg)
Disrupting a power grid with cheap equipment hidden in a coffee cup
Cyber-physical systems security researchers at the University of California, Irvine can disrupt the functioning of a power grid using about $50 worth of equipment tucked …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
62% of blue teams have difficulty stopping red teams during adversary simulation exercises
New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises. Respondents named threat detection, incident …
![ISO](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/18125119/iso-logo-400x200.jpg)
Thousands of ISO certifications at risk of lapsing due to halted re-certification audits
Thousands of valuable ISO management system certifications earned by UK companies may now be at risk because auditors from Certification Bodies may not have been able to …
![CCSP training](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19140307/official-ccsp-training-400x200.png)
Expand your cloud expertise: Discount on CCSP training
This promotion has ended. Challenging times call for exceptional measures. And (ISC)² is committed to helping you keep your Certified Cloud Security Professional (CCSP) …
![FIDO](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/18110202/fido-logo-keys-400x200.jpg)
Five ways to maximize FIDO
Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
The benefits of providing employees with an identity compromise solution
Employees find significant value in having access to an identity compromise solution, having an available remediation solution creates a better mindset for those that use it, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege