Help Net Security
![Biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112119/biohazard-400x200.jpg)
Macro-less malware: The cyclical attack
Last year, attackers linked to the Russian hacking group APT28 (sometimes called Fancy Bear) started hacking like its 1999 with Microsoft Word-based malware that doesn’t …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101941/gdpr-400x200.jpg)
7 steps for getting your organization GDPR-ready
While the EU has had long established data protection standards and rules, its regulators haven’t truly commanded compliance until now. Under the General Data Protection …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101945/industry-400x200.jpeg)
Number of Internet-accessible ICS components is increasing every year
The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Week in review: The future of smartphone security, automated cyber threat anticipation
Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security …
![Groundhog Day](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101949/groundhog_day-400x200.jpeg)
Groundhog Day: Third-party cyber risk edition
Over the past four years, I’ve had countless conversations with hundreds of companies around third-party cyber risk issues. It’s been my personal Groundhog Day, so …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104440/businessman-400x200.jpg)
Bomgar acquires Lieberman Software
Bomgar has acquired Lieberman Software, a provider of privileged identity and credential management software. Terms of the transaction were not disclosed. Remote access is the …
![smartphone isolation](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101952/smartphone-isolation-400x200.jpg)
The future of smartphone security: Hardware isolation
Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103857/bec_scams-400x200.jpg)
BEC scams surge, cybercriminals target nearly all organizations
96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017, according to Agari. “BEC is a particularly effective attack …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Innovative organizations build security into their cloud strategy
Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102004/architecture-400x200.jpeg)
How do your IT complexity challenges compare to those of other CIOs?
A global survey of 800 CIOs conducted by Vanson Bourne reveals that 76% of organizations think IT complexity could soon make it impossible to manage digital performance …
![The Ransomware Survival Handbook](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09101957/ransomware-survival-handbook-400x200.jpg)
The Ransomware Survival Handbook
When a ransomware infection spreads through your network, its goal is to encrypt any files it can access (even backups) as quickly as possible. That can happen in a matter of …
![netflow patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102010/netflow-patch-400x200.jpg)
Multiple zero-day vulnerabilities found in ManageEngine products
Digital Defense uncovered multiple, previously undisclosed vulnerabilities within several Zoho ManageEngine products. ManageEngine offers more than 90 tools to help manage IT …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes