Help Net Security
November 2018: Most wanted malware exposed
Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers …
Product showcase: iStorage diskAshur PRO² SSD
The diskAshur PRO² SSD is an ultra-secure, PIN authenticated, portable USB 3.1 hard drive with real-time AES-XTS 256-bit hardware encryption. It doesn’t require any …
New Comodo Cybersecurity services address mounting SMB cyberattacks
Comodo Cybersecurity, a global leader in threat intelligence and malware cyberdefense, today introduced new managed security services in response to mounting cyberattacks on …
High profile incidents and new technologies drive cybersecurity M&A to record highs
The Cybersecurity M&A Market Report from international technology mergers and acquisitions advisors, Hampleton Partners, outlines how high profile hacks, the global …
An integrated approach helps companies improve operational resilience
By taking a unified approach to managing critical events (i.e. extreme weather, violence, supply chain disruption), businesses can significantly reduce the impact on employee …
Consumers still put trust in big brands despite breaches
Janrain conducted a survey to better understand how consumers really feel about brands in the wake of so many breaches. The company polled 1,000 UK adults and found that most …
Not all data collection is evil: Don’t let privacy scandals stall cybersecurity
Facebook continues to be criticized for its data collection practices. The media is hammering Google over how it handles data. JPMorgan Chase & Company was vilified for …
How can businesses get the most out of pentesting?
More than 4.5 billion data records were compromised in the first half of this year. If you still feel like your enterprise is secure after reading that statistic, you’re one …
Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking …
Report: Pioneering Privileged Access Management
Gartner released the first-ever Magic Quadrant for Privileged Access Management*, – it is, in our view, a significant milestone for the industry. We believe it spotlights the …
December Patch Tuesday forecast: Let it snow, let it snow, let it snow
Grab your shovels, dust off the snow blower, and bundle up. The way patches are accumulating this month is making me think of winter in Minnesota. I’m talking about the kind …
Half of management teams lack awareness about BPC despite increased attacks
Trend Micro revealed that 43 percent of surveyed organizations have been impacted by a Business Process Compromise (BPC). Despite a high incidence of these types of attacks, …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring