cyberattack
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105302/eye-400x200.jpg)
Deception technology shifts power back to the defender
Users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to …
![hidden attacker](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103527/fish-hidden-400x200.jpg)
Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they …
![online shop owned](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110341/online-shop-owned-400x200.jpg)
Online skimming: An emerging threat that requires urgent awareness and attention
A growing threat that all merchants and service providers should be aware of is web-based or online skimming. These attacks infect e-commerce websites with malicious code, …
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093710/mobile-400x200.jpg)
As attackers get more creative, mobile threats and attacks increase in both quantity and impact
It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101845/iot-400x200.jpg)
Many companies don’t know the depth of their IoT-related risk exposure
In the digital age, cyber is everywhere. Cyber risk now permeates nearly every aspect of how we live and work. Organizations should better understand how to manage the risks …
![contactless payment](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093734/contactless-400x200.jpg)
Flaws allow attackers to bypass payment limits on Visa contactless cards
Flaws that allow attackers to bypass the payment limits on Visa contactless cards have been discovered by researchers Leigh-Anne Galloway and Tim Yunusov at Positive …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Ransomware attack leaves Johannesburg residents without electricity
A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094316/person-1-400x200.jpg)
Damaging insider threats rise to new highs in the past year
70 percent of organizations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
50% of organizations believe attackers can infiltrate their networks each time they try
As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Every minute, $2.9 million is lost to cybercrime
Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion, according to RiskIQ. Top companies pay $25 per minute due to security …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112020/email-1-400x200.jpg)
Employees overestimate the efficacy of their workplace’s email security strategy
22 percent of businesses have experienced a data breach – defined as loss of confidential data or credentials, compromised account loss, or fraudulent financial transactions – …
![wolf](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094428/wolf-400x200.jpg)
Most SMBs have not identified and documented cybersecurity threats
A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD