cyberattack
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
The frequency of DDoS attacks depends on the day and time
Multivector and cloud computing attacks have been rising over the last twelve months, according to Link11. The share of multivector attacks – which target and misuse several …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Cyberattackers decreased their activity at the end of 2019, but only to change tactics
Attackers know that humans are still the weakest link. Across the board, malicious cyber-activity was down partly as a result of hectic holiday schedules and vacations with …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093230/shield2-400x200.jpg)
What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102357/money-danger-400x200.jpg)
Emotet remains the dark market leader for delivery-as-a-service
The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100018/bomb-400x200.jpg)
Companies increasingly reporting attacks attributed to foreign governments
More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
Challenges of using firewall tech to do segmentation
Despite the inevitability of security-related incidents, few organizations currently protect against the spread of breaches with segmentation – only 19 percent of the 300 IT …
![innovation](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093753/innovation-400x200.jpg)
Cybersecurity industry predictions for 2020 and beyond
When it comes to cybersecurity industry predictions for 2020, Optiv researchers expect to see a focus on privacy, evolving threat actors, pervasive deepfake videos, and …
![DNSSEC](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095140/dnssec-400x200.jpg)
DNSSEC still fueling DNS amplification attacks, TCP SYN flood attacks rise
DNS amplification attacks continue to increase in number, growing 4,788% over Q3 2018, according to Nexusguard. DNSSEC (Domain Name System Security Extensions) remains the …
![Trend Micro oil and gas industry](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/12160333/trendmicro_oilgas-400x200.jpg)
Oil and gas industry risks escalate, cybersecurity should be prioritized
The oil and gas industry and its supply chain face increased cybersecurity risks from advanced threat groups and others as they continue to build out digitally connected …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093210/server1-400x200.jpg)
Will quantum computing overwhelm existing security tech in the near future?
More than half (54%) of cybersecurity professionals have expressed concerns that quantum computing will outpace the development of other security tech, according to a research …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections
Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD