Help Net Security
A closer look at the global threat landscape
60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to …
Cryptocurrency crime losses more than double to $4.5 billion in 2019
Cryptocurrency users, exchanges and investors suffered $4.5 billion in crypto-related losses resulting from thefts, hacks, and fraud, a CipherTrace report reveals. …
Employees aware of privacy risks, but unsure of how they affect the workplace
62 percent of employees are unsure if their organization has to comply with the recently-enacted CCPA, which gives California residents enhanced consumer data privacy rights, …
Crucial trends shaping the managed services market
Managed services remain healthy and profitable, with great opportunities for growth, including advanced security, automation, and business operations, a SolarWinds report …
Download: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification
Make this year your year for (ISC)² certification. Prepping for an (ISC)² credential is a big commitment. Maybe you’ve started on the path to achieving CISSP, SSCP or CCSP …
Emotet: Crimeware you need to be aware of
According to the U.S. Department of Homeland Security, Emotet continues to be among the most costly and destructive malware threats affecting state, local, and territorial …
Credential exposure report: Poor password habits still pose a serious threat
9,050,064,764 credentials have been recovered throughout 2019 which came from a total of 640 unique data breaches and include email addresses connected to plaintext passwords …
Mac threats are growing faster than their Windows counterparts
Mac threats growing faster than their Windows counterparts for the first time ever, with nearly twice as many Mac threats detected per endpoint as Windows threats, according …
The rise of human-driven fraud attacks
There has been a major spike in human-driven attacks – which rose 90% compared to six months previously, according to Arkose Labs. Changing attack patterns were felt across …
Download: IR Management and Reporting PowerPoint template
While the IR process is mostly technical, reporting to the organization’s management should take place on a much higher-level in order for the non-security savvy executives to …
The 25 most impersonated brands in phishing attacks
PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …
Cybersecurity is a board level issue: 3 CISOs tell why
As a venture capital investor who was previously a Chief Information Security Officer, I have noticed an interesting phenomenon: although cybersecurity makes the news often …
Featured news
Resources
Don't miss
- Edge computing’s biggest lie: “We’ll patch it later”
- Cyber risk is becoming a hold-period problem for private equity firms
- Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
- 1Password open sources a benchmark to stop AI agents from leaking credentials
- Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)