cyberattack
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/04082432/ransomware-400x200.jpg)
Ransomware getting more fearsome, but there’s reason for optimism
Cybercriminals continued a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability. A report from …
![audio](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093140/audio2-400x200.jpg)
Researchers use ultrasound waves vibrating through tables to access cellphones
Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102012/hand_computer-400x200.jpeg)
Only 38% of US govt workers received ransomware prevention training
73% of government employees are concerned about impending ransomware threats to cities across the country, and more employees fear of cyberattacks to their community than …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/09122405/firefox-logo-new-1-400x200.jpg)
A new way for securing web browsers from hackers
A powerful new approach to securing web browsers is getting its first real-world application in the Firefox browser. Developed by a team of researchers from The University of …
![David Rupprecht and Dr. Katharina Kohls](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/20105604/david-rupprecht_katharina-kohls-400x200.jpg)
By exploiting an LTE vulnerability, attackers can impersonate mobile phone users
Exploiting a vulnerability in the mobile communication standard LTE, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book …
![M-Trends 2020 Report](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/21095453/m-trends2020-400x200.jpg)
Increased monetization means more ransomware attacks
Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Organizations lack confidence in their network security
IoT is barreling toward the enterprise, but organizations remain highly vulnerable to IoT-based attacks, according to Extreme Networks. The report, which surveyed 540 IT …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/19150155/danger-400x200.jpg)
High-risk vulnerabilities and public cloud-based attacks on the rise
A sharp increase (57%) in high-risk vulnerabilities drove the threat index score up 8% from December 2019 to January 2020, according to the Imperva Cyber Threat Index. …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
Most credential abuse attacks against the financial sector targeted APIs
From May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targeting APIs, in an effort to bypass security controls. …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
A closer look at the global threat landscape
60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/11151617/apple-orange-400x200.jpg)
Mac threats are growing faster than their Windows counterparts
Mac threats growing faster than their Windows counterparts for the first time ever, with nearly twice as many Mac threats detected per endpoint as Windows threats, according …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
The rise of human-driven fraud attacks
There has been a major spike in human-driven attacks – which rose 90% compared to six months previously, according to Arkose Labs. Changing attack patterns were felt across …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD