Help Net Security

RSA Conference announces 2018 keynote speakers
RSA Conference, the world’s leading information security conferences and expositions, today announces its full line-up of keynote speakers for the 2018 Conference, which …

Gang leader behind malware attacks targeting 100 financial institutions arrested in Spain
The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting over a 100 financial institutions worldwide has been arrested in Alicante, Spain, after a …

How Facebook’s data issue is a lesson for everyone
The headlines have been dominated by the recent news around Facebook, Cambridge Analytica and the misuse of customer data. The impact of these revelations has led to millions …

Businesses know breaches are happening, but do they know how, why and when?
Nearly four in five companies (79%) were hit by a breach in the last year, according to Balabit. Their research also revealed that 68% businesses expect to be impacted by …

Phishing, malware, and cryptojacking continue to increase in sophistication
Attackers are constantly trying new ways to get around established defenses. The data, collected throughout 2017 by Webroot, illustrates that attacks such as ransomware are …

Experiences and attitudes towards cloud-specific security capabilities
Dimensional research conducted a survey of IT professionals responsible for cloud environments. The survey, which is comprised of data collected from over 600 respondents from …

Week in review: PKI and IoT, Facebook’s trust crisis, understanding email fraud
Here’s an overview of some of last week’s most interesting news and articles: Top cybersecurity evasion and exfiltration techniques used by attackers SS8 released …

1 in 10 targeted attack groups use malware designed to disrupt
Cyber criminals are rapidly adding cryptojacking to their arsenal and creating a highly profitable new revenue stream, as the ransomware market becomes overpriced and …

Top cybersecurity evasion and exfiltration techniques used by attackers
SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders. During the past …

Malicious apps in app stores decrease 37 percent
Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, …

Excessive alerts, outdated metrics, lead to over-taxed security operations centers
A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …

Global WAN survey highlights the importance of network simplification
Cato Networks, provider of the global SD-WAN as a service Cato Cloud, released the findings of its enterprise WAN market study. The report, “State of WAN 2018: Too Complex to …