cyberattack
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094631/hit-400x200.jpg)
Cyber attackers view smaller organizations as easier targets
Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. This Help Net Security video showcases how …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Phishing activity exploded in Q2 2022
The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst quarter for phishing that …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/06144957/open-source-code-hns-400x200.jpg)
Open source projects under attack, with enterprises as the ultimate targets
Sonatype has found a massive year-over-year increase in cyberattacks aimed at open source projects. According to early data from Sonatype’s 8th annual State of the …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/10142333/phishing_red-hns2-400x200.jpg)
Phishing attacks skyrocketing, over 1 million observed
The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst quarter for …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
Mitigating the cybersecurity crisis for the school year ahead
As students head back into the classroom, K-12 district leaders are faced with the difficult task of preventing and mitigating cybersecurity threats against their districts. …
![Building](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194404/corporate9-400x200.jpg)
SMBs vs. large enterprises: Not all compromises are created equal
Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. Lumu has found that compromise is …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110009/industry-400x200.jpg)
The rise of attacks on critical infrastructure
A recent research found an increase in attacks across all the most targeted industries and organizations, including education, healthcare and finance. Attacks on critical …
![Degree](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102927/college-degree-400x200.jpg)
How safe is the cloud infrastructure of educational institutions?
83% of educational organizations confirmed they store sensitive data in the cloud. With educators and students constantly sharing that information, they are more concerned …
![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/20170619/cloud-target-400x200.jpg)
Most critical security gaps in the public cloud
Orca Security released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Q-Day doesn’t equal doomsday: Enacting an enterprise quantum security strategy
While Quantum Day, or “Q-Day,” may be five to ten years away, it is arriving faster than we would like. Q-Day represents the day that quantum computers will reliably use the …
![100 dollars](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101622/100dollars-400x200.jpg)
SMBs are hardest-hit by ransomware
Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, …
![social media](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/14094140/social_media_like-400x200.jpg)
Thwarting attackers in their favorite new playground: Social media
For years, LinkedIn has been utilized by threat actors looking to refine their attacks. From simple spear-phishing attacks to reconnaissance, the professional networking site …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD