Help Net Security

Criminals leverage unsecured IoT devices, DDoS attacks surge
Organizations experienced an average of 237 DDoS attack attempts per month during Q3 2017 – equivalent to 8 DDoS attack attempts every day – as hackers strive to take their …

Why hackers reuse malware
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

South Korea Winter Olympics: Cyber lessons from the past
There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …

Sad state of enterprise cloud infrastructure governance
A new survey of more than 300 IT professionals, conducted by Propeller Insights in October 2017, revealed that the state of enterprise cloud infrastructure governance is …

Week in review: Risk assessment, fileless attacks, and the most hackable holiday gifts
Here’s an overview of some of last week’s most interesting news and articles: Review: EU GDPR Documentation Toolkit The General Data Protection Regulation (GDPR) …

Poor security habits are the ideal recipe for a breach
A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees …

Safeguard mobile devices: VPNs and personal firewalls are vital
As mobile devices have permeated every aspect of private and professional lives, users have become increasingly dependent on connecting to public hotspots – especially when …

A third of US businesses do not feel prepared for GDPR deadline
New research by Censuswide captures the preparedness levels of organizations in Europe and the United States for the May 2018 GDPR compliance deadline, as well as their …

Half of organizations do not audit SSH entitlements
Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted …

High-Tech Bridge unveils free application discovery and inventory service
High-Tech Bridge announce the public launch of ImmuniWeb Discovery. The free service is a part of the ImmuniWeb Application Security Testing (AST) Platform. ImmuniWeb …

Free security tool protects Internet users through DNS
IBM Security, Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) launched a free service designed to give consumers and businesses added privacy and security …

For strong unified communications security, behavioral analytics is critical
If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC