Please turn on your JavaScript for this page to function normally.
connection
Digital transformation success at risk as CIOs struggle to deliver digital projects

Despite rising optimism in digital transformation, the vast majority of organizations are still suffering failure, delays or scaled back expectations from digital …

bug
Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!

Risk Based Security uncovered multiple vulnerabilities in the AK-EM 800 product from SCADA vendor Danfoss. The discovered vulnerabilities Researchers found two critical …

Android
Security hole opens a billion Android users to advanced SMS phishing attacks

Check Point Research has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The …

Vectra Cognito platform
Security pros need more and better visibility into their cloud networks

In this Help Net Security podcast, Kevin Sheu, VP Product Marketing and Marcus Hartwig, Senior Product Marketing Manager at Vectra AI, discuss the Vectra superhero survey from …

reload
What prevents companies from achieving effective security performance management?

Cybersecurity performance is critical to achieving commercial success, according to a BitSight study. Among the study’s most interesting findings is that nearly two in five …

hand
A look into the frequency and success of phishing attacks on SMEs

43% of UK SMEs have experienced a phishing attempt through impersonation of staff in the last 12 months. Of those impersonation phishing attempts, it was discovered that …

money
How fraud prevention tech can save banks €10M a year

A typical European bank, serving 10 million customers, could save up to €10 million annually and avoid growing fines by the regulator by implementing technology to improve the …

Cynet platform
Free offering enables any MSP and security integrator to add incident response to their services portfolio

The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and more organizations, across all sizes and …

jackal
Cardholders still dropping the ball when it comes to basic ID theft prevention

Four in 10 people with a credit or debit card have provided their full Social Security number in an online form in the past month, according to a new report from CompareCards, …

wireless
Researchers develop cheaper, more efficient Internet connectivity for IoT devices

A cheaper and more efficient method for IoT devices to receive high-speed wireless connectivity has been developed by researchers at the University of Waterloo. With 75 …

ThreatConnect whitepaper
Whitepaper: Security Orchestration with Threat Intelligence

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. This …

attack
Week in review: Mass iPhone hacking, SSL VPNs under attack, SOC analysts overwhelmed

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Cybersecurity in the age of the remote workforce Users can be set up for a …

Don't miss

Cybersecurity news