Help Net Security

Cybersecurity insurance: A global perspective
While the majority of global organizations say that it is “vital” their organization is insured against information security breaches, less than half (41%) are …

DDoS aggression and the evolution of IoT risks
Few organizations globally are being spared DDoS attacks, according to a Neustar survey of over 1,000 IT professionals across six continents. With the bombardment fairly …

Cybercriminals increasingly exploiting human nature
Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …

Facebook vulnerability allowed access to personal and payment information
Bitdefender has discovered a significant vulnerability within Facebook which allowed access to any user account through simple social login manipulation. The attacker was able …

The economics of hacking: Change your thinking
If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is …

Who’s next? Shift focus and detect network attackers
Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some …

Attackers opt for discreet methods to spy inside the network
For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …

Most organizations still lack visibility into database assets
Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …

Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

Week in review: Opera’s VPN is just a proxy, GDPR compliance, hacking traffic sensors
Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he …

Identity protection: The critical intersection of biometrics and commerce
In light of some high-profile data breaches in recent years, businesses are constantly seeking possible forms of authentication to replace passwords. While such breaches might …

Increase in credit card leaks with high profile apps and sites
A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …
Featured news
Resources
Don't miss
- The hidden risk in SaaS: Why companies need a digital identity exit strategy
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery