cyberattack
![ICS](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/18134258/ics-red-sky-400x200.jpg)
The biggest threat to ICS/OT is a lack of prioritization
A SANS survey reveals that cyber attackers have demonstrated a robust understanding of operational technology (OT) and industrial control system (ICS) engineering and have …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100018/bomb-400x200.jpg)
Bad actors are becoming more successful at evading AI/ML technologies
Deep Instinct Threat Research team extensively monitored attack volumes and types and then extrapolated their findings to predict where the future of cybersecurity is heading, …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15170309/log4j-industry-hns-400x200.jpg)
Security leaders want legal action for failing to patch for Log4j
The recently identified vulnerability in the Log4j Java logging package has created headaches for security professionals around the world. 61% of organizations responding to …
![Rowland Corr](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/24115222/rowland_corr_2-adaptive_mobile_sec-400x200.jpg)
Leveraging mobile networks to threaten national security
In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110109/danger-400x200.jpg)
Cybercrime getting more destructive, remote workers in the crosshairs
Fortinet’s threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094044/fire-400x200.jpg)
Data leaks and shadow assets greatly exposing organizations to cyberattacks
CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2021/06/28132545/ransomware_demands-400x200.jpg)
Cybercriminals seeking more than just ransomware payment
Venafi announced the findings of a global survey of IT decision-makers looking into the use of double and triple extortion as part of ransomware attacks. The data reveals that …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/05094040/ecommerce-400x200.jpg)
The impact of API security on how consumers view brands
ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092735/bomb2-400x200.jpg)
Carpet bombing DDoS attacks spiralled in 2021
Neustar Security Services has released a report which details the ongoing rise in cyberattacks in 2021, with an unprecedented number of carpet bombing distributed denial of …
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094442/dislike-400x200.jpg)
Social media attacks surged in 2021, financial institutions targeted the most
Social media as a threat channel saw a two-fold increase in attacks throughout 2021, according to a report from PhishLabs. In Q4 and throughout 2021, PhishLabs analysed …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
Ransomware’s savage reign continues as attacks increase 105%
SonicWall released a report which details a sustained meteoric rise in ransomware with 623.3 million attacks globally. Nearly all monitored threats, cyberattacks and malicious …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
Even when warned, businesses ignore critical vulnerabilities and hope for the best
A Bulletproof research found the extent to which businesses are leaving themselves open to cyber attack. When tested, 28% of businesses had critical vulnerabilities – …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)