Help Net Security
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094523/laptop-400x200.jpg)
A casual approach to workplace communications presents major security risks
Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their …
![blockchain](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100809/blockchain-400x200.jpg)
Research on private key generation reveals theft of ETH funds from accounts with discoverable keys
Researchers at Independent Security Evaluators (ISE) have discovered 732 actively used private keys on the Ethereum blockchain. In their new study titled Ethercombing, ISE …
![eSentire whitepaper](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094534/esentire-whitepaper-400x200.jpg)
Whitepaper: Third-Party Risk to the Nth Degree
For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors. The Third-Party Risk to the Nth …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094545/stop-400x200.jpg)
The foundation: Quantifying risk with focused security measurement
When you hear “quantify risk,” you might think it’s the buzz-term du jour. You might be right. Risk quantification is a hot topic right now. It seems everyone who touches …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Attackers are weaponizing more vulnerabilities than ever before
2018 had the most weaponized vulnerabilities ever (177), which represents a 139% increase compared to 2017, according to the RiskSense latest report. In addition, the rate of …
![PDF](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094549/PDF2-400x200.jpg)
PDF: The vehicle of choice for malware and fraud
There has been a substantial increase of fraudulent PDF files, according to a report by SonicWall Capture Labs threat researchers. This fraud campaign takes advantage of …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100140/network-400x200.jpeg)
Scientists may have identified a new way to improve network security
With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101209/bot-400x200.jpg)
As bad bots grow more sophisticated, so does the number of industries impacted by them
Bot attack sophistication continues to evolve, as advanced attackers learn to adapt their techniques in order to invalidate existing defense tactics, according to Distil …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112303/users-1-400x200.jpg)
Underserved populations unaware of cybersecurity risks
Members of underserved populations are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. …
![road](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103221/road-400x200.jpeg)
Week in review: G Suite security enhancements, Microsoft 365 security
Here’s an overview of some of last week’s most interesting news and articles: One hundred percent of endpoint security tools eventually fail Endpoint security tools and agents …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094609/data-400x200.jpg)
Building a modern data registry: Go beyond data classification
For organizations, understanding what data they store and analyze is gaining increasing urgency due to new privacy regulations, from the Global Data Privacy Regulation (GDPR) …
![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
Worldwide IT spending to grow just 1.1% in 2019
Worldwide IT spending is projected to total $3.79 trillion in 2019, an increase of 1.1 percent from 2018, according to the latest forecast by Gartner. “Currency headwinds …
Featured news
Sponsored
Don't miss
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation