![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
Cybercriminals increasingly impersonate business-related apps
Cybercriminals have wasted little time in capitalizing on the vulnerabilities that come with remote work, and their attacks have been highly targeted, with a focus on …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/08194013/microsoft_exchange_2020-1-400x200.jpg)
Exchange Servers targeted via zero-day exploits, have yours been hit?
Microsoft has released out-of-band security updates for seven bugs affecting Microsoft Exchange Servers, four of which are zero-day vulnerabilities being exploited by …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Security researchers targeted by North Korean hackers
Over the past few months, hackers have been trying to surreptitiously backdoor the computer systems of a number of security researchers working on vulnerability research and …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
Malwarebytes was breached by the SolarWinds attackers
A fourth malware strain wielded by the SolarWinds attackers has been detailed by Symantec researchers, followed by the disclosure of the attackers’ ingenous lateral …
![DNS](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13101124/dns-yellow-400x200.jpg)
How prevalent is DNS spoofing? Could a repeat of the Dyn/Mirai DDoS attack have the same results?
Two separate groups of academics have recently released research papers based on research into the Domain Name System (DNS). One has found that the overwhelming majority of …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
Organizations plan to use AI and ML to tackle unknown attacks faster
Wipro published a report which provides fresh insights on how AI will be leveraged as part of defender stratagems as more organizations lock horns with sophisticated …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092913/keys-400x200.jpg)
Encryption-based threats grow by 260% in 2020
New Zscaler threat research reveals the emerging techniques and impacted industries behind a 260-percent spike in attacks using encrypted channels to bypass legacy security …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093728/phishing1-400x200.jpg)
How to deal with the escalating phishing threat
In today’s world, most external cyberattacks start with phishing. For attackers, it’s almost a no-brainer: phishing is cheap and humans are fallible, even after …
![Brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/27085037/brain-ml-400x200.jpg)
A new threat matrix outlines attacks against machine learning systems
A report published last year has noted that most attacks against artificial intelligence (AI) systems are focused on manipulating them (e.g., influencing recommendation …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
The anatomy of an endpoint attack
Cyberattacks are becoming increasingly sophisticated as tools and services on the dark web – and even the surface web – enable low-skill threat actors to create highly evasive …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Large US hospital chain hobbled by Ryuk ransomware
US-based healtchare giant Universal Health Services (UHS) has suffered a cyberattack on Sunday morning, which resulted in the IT network across its facilities to be shut down. …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Credential stuffing is just the tip of the iceberg
Credential stuffing attacks are taking up a lot of the oxygen in cybersecurity rooms these days. A steady blitz of large-scale cybersecurity breaches in recent years have …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD