Help Net Security

Police dismantle organised crime network suspected of online payment scams
The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …

Week in review: Fireball malware infects 250 million computers, attacks within the Dark Web
Here’s an overview of some of last week’s most interesting news and articles: OneLogin suffers data breach, again OneLogin, a popular single sign-on service that …

FTSE companies lack secure data collection methods
With less than a year remaining until the commencement of the GDPR, new research reveals that more than one-third of all public web pages of FTSE 30 companies capturing …

Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …

Fireball malware infected 250 million computers worldwide
Check Point researchers discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, named Fireball, takes …

Ready or not, IoT third party risks are here
A new survey conducted by The Ponemon Institute uncovered a high rate of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate …

Rising volume of attacks overpowers security teams
New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …

Half of US firms don’t have cybersecurity insurance
A full 50 percent of US firms do not have cybersecurity insurance, despite the fact that 61 percent of US firms expect the volume of cyber breaches to increase in the next …

Vulnerability affecting 1,000+ apps is exposing terabytes of data
A newly discovered backend data exposure vulnerability, dubbed HospitalGown, highlights the connection between mobile apps and insecure backend databases. Appthority …

Cisco and IBM Security announce services and threat intelligence collaboration
In a new agreement, Cisco and IBM Security will work closer together across products, services and threat intelligence for the benefit of customers. Cisco security solutions …

Balancing act: Ensuring compliance with GDPR and US regulations
The impending GDPR, which will go into effect in a little less than a year from now, is going to have a significant impact on enterprise cybersecurity and data governance …

Analyzing phishing attacks against 500,000 mailboxes at 100 organizations
Phishing has evolved from a mere nuisance into a global epidemic in which organizations of all sizes and across all industries are being negatively impacted at high frequency. …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers