Please turn on your JavaScript for this page to function normally.
attack lifecycle
![DBIR 2020](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/19100554/dbir-2020-400x200.jpg)
Money is still the root of most breaches
Verizon has released its annual Data Breach Investigations Report (DBIR), which offers an overview of the cyber security incidents and data breaches that happened in/were …
![bug](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101615/bug-400x200.jpg)
Should we add bugs to software to put off attackers?
A group of New York University researchers are testing a new approach to software security: adding more bugs to it instead of removing them. The idea is to “drown …
![analytics IT assets](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113947/analytics-400x200.jpg)
Attack rates are increasing across the board
Finance and technology are the sectors most resilient to cyber intrusions, new research from Vectra Networks has found. The company released the results of its Post-Intrusion …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD