cyberattack
![HNS QR code](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/15165347/hns-qrcode-400x200.jpg)
Most people ignore QR code security concerns
QR codes are rising in popularity and use, according to a consumer sentiment study by MobileIron. Sixty-four percent of respondents stated that a QR code makes life easier in …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093728/phishing1-400x200.jpg)
What are the most vulnerable departments and sectors to phishing attacks?
While cyber attackers chase down system vulnerabilities and valuable data each passing day, the business world has taken the measures against them. The latest trends and …
![cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103021/cybersecurity-400x200.jpg)
Tracking global cybercrime activity and the impact on the digital economy
A LexisNexis Risk Solutions report tracks global cybercrime activity from January 2020 through June 2020. The period has seen strong transaction volume growth compared to 2019 …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093803/cloud-drive1-400x200.jpg)
Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain
There’s a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092814/money-1-400x200.jpg)
What happens to funds once they have been stolen in a cyberattack?
SWIFT and BAE Systems published a report that describes the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101750/cryptocurrency2-400x200.jpg)
Cryptomining activity could be a sign your servers are under attack
Organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle, Trend Micro research …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112300/phishing-400x200.jpg)
Organizations facing surge in phishing attacks since the start of the pandemic
The frequency of phishing threats has risen considerably since the pandemic started, with companies experiencing an average of 1,185 attacks every month, according to a survey …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Phishing gangs mounting high-ticket BEC attacks, average loss now $80,000
Companies are losing money to criminals who are launching Business Email Compromise (BEC) attacks as a more remunerative line of business than retail-accounts phishing, APWG …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093404/money-400x200.jpg)
The global cost of cybercrime per minute to reach $11.4 million by 2021
Cybercrime costs organizations $24.7, YOY increase of more than $2 every minute, a RiskIQ report reveals. It will also have a per-minute global cost of $11.4 million by 2021, …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
91% of cybersecurity pros want stricter internet measures to tackle misinformation
There’s a growing unease amongst the cybersecurity community around the recent rise in misinformation and fake domains, Neustar reveals. 48% of cybersecurity …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
Researchers develop AI technique to protect medical devices from anomalous instructions
Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Researchers aim to improve code patching in embedded systems
Three Purdue University researchers and their teammates at the University of California, Santa Barbara and Swiss Federal Institute of Technology Lausanne have received a DARPA …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints