cyberattack
![dotcom](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094030/dotcom-400x200.jpg)
Every year, millions of web domains are registered to defraud businesses
The growth of fraudulent domains corresponds to the growth of the overall domain landscape, according to Proofpoint. Between Q1 and Q4 2018, registrations of fraudulent …
![law enforcement](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102226/law_enforcement-400x200.jpg)
Eurofins ransomware attack affected UK police work
Eurofins, a global provider of scientific testing services, said on Monday that operations are returning to normal after the recent ransomware attack, but that its impact on …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Why poor visibility is hampering cybersecurity
Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095925/botnet-400x200.jpg)
Botnets shift from Windows towards Linux and IoT platforms
Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100522/industrial-400x200.jpeg)
Organizations are advancing their efforts, investing in OT cybersecurity programs
ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing …
![gamer](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095510/gamer-400x200.jpg)
The gaming community is a rising target for credential stuffing attacks
Hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Ransomware disrupts worldwide production for Belgian aircraft parts maker
ASCO Industries, a manufacturer of aerospace components with headquarters in Zaventem, Belgium, has been hit with ransomware, which ended up disrupting its production around …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
Code signing keys and certificates are crucial security assets, are you protecting them?
Only 28 percent of organizations consistently enforce a defined security process for code signing certificates, a Venafi study of over 320 security professionals in the U.S., …
![connected house](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104916/connected-house-400x200.jpg)
Smart home security devices most at risk in IoT-targeted cyber attacks
Smart home security cameras equate to 47% of the most vulnerable devices followed by smart hubs such as Googlehome, Amazon Alexa, with the top countries executing attacks …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094518/email-400x200.jpg)
3.4 billion fake emails are sent around the world every day
At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because …
![mobile user](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101502/mobile_user-400x200.jpg)
High-risk behaviors expose most travelers to cyber risks
The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100018/bomb-400x200.jpg)
Cybercriminals continue to evolve the sophistication of their attack methods
Cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding for some attacks, to living-off-the-land (LoTL) or …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD