cyberattack
![building](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104924/building-400x200.jpg)
Most companies have high-risk vulnerabilities on their network perimeter
Positive Technologies performed instrumental scanning of the network perimeter of selected corporate information systems. A total of 3,514 hosts were scanned, including …
![Code](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/10182058/code-glasses-400x200.jpg)
How important are vulnerability management investments for a cybersecurity posture?
Vulnerability management (VM) technology addresses the threat landscape, which is in a constant state of flux. The wider dispersal of endpoints across private and public cloud …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
Attacks on IoT devices continue to escalate
Attacks on IoT devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit these vulnerabilities, …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195057/sign-1-400x200.jpg)
Organizations struggle to obtain quality threat data to guide key security decisions
Organizations are often forced to make critical security decisions based on threat data that is not accurate, relevant and fresh, a Neustar report reveals. Just 60% of …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101802/office365-400x200.jpg)
Attackers finding new ways to exploit and bypass Office 365 defenses
Over the six-month period from March to August 2020, over 925,000 malicious emails managed to bypass Office 365 defenses and well-known secure email gateways (SEGs), an Area 1 …
![DNS](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13101124/dns-yellow-400x200.jpg)
DNS attacks increasingly target service providers
The telecommunications and media sector is the most frequent victim of DNS attacks, according to EfficientIP. DNS attacks on service providers According to the IDC 2020 Global …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
Machine identity related cyberattacks grew by 433% between 2018 and 2019
The machine identity attack surface is exploding, with a rapid increase in all types of machine identity-related security events in 2018 and 2019, according to Venafi. For …
![laptop crime](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105508/laptop-crime-400x200.jpg)
63 billion credential stuffing attacks hit retail, hospitality, travel industries
Akamai published a report detailing criminal activity targeting the retail, travel, and hospitality industries with attacks of all types and sizes between July 2018 and June …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Cybercrime capitalizing on the convergence of COVID-19 and 2020 election
The cybersecurity challenges of the global pandemic are now colliding with the 2020 U.S. presidential election resulting in a surge of cybercrime, VMware research reveals. …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
SecOps teams turn to next-gen automation tools to address security gaps
SOCs across the globe are most concerned with advanced threat detection and are increasingly looking to next-gen automation tools like AI and ML technologies to proactively …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Is poor cyber hygiene crippling your security program?
Cybercriminals are targeting vulnerabilities created by the pandemic-driven worldwide transition to remote work, according to Secureworks. The report is based on hundreds of …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Global adoption of data and privacy programs still maturing
The importance of privacy and data protection is a critical issue for organizations as it transcends beyond legal departments to the forefront of an organization’s …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints