cybercrime
![Skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103817/skull-ascii-400x200.jpg)
Ransomware attacks hit 1 in 5 Americans
Anomali announced the results of a survey conducted by The Harris Poll. It includes responses from more than 2,000 American adults and reveals how Americans believe business …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101053/phishing-400x200.jpg)
Researchers reveal the latest lateral phishing tactics
Emails coming from legitimate, compromised accounts are difficult to spot, both for existing email protection systems and the recipients themselves. Lateral phishing tactics …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Threat actors are adapting and switching their operations strategically and technically
Cybercrime campaigns and high-profile advanced persistent threat groups are shifting how they target victims and focusing more on intricate relationships with “secure …
![hidden attacker](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103527/fish-hidden-400x200.jpg)
Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
Five examples of user-centered bank fraud
In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Ransomware attack leaves Johannesburg residents without electricity
A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Every minute, $2.9 million is lost to cybercrime
Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion, according to RiskIQ. Top companies pay $25 per minute due to security …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093824/money-400x200.jpg)
Average data breach cost has risen to $3.92 million
The cost of a data breach has risen 12% over the past 5 years and now costs $3.92 million on average, according to IBM. These rising expenses are representative of the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Cyberthreats targeting municipalities are on the rise
Through the first half of 2019, a growing number of municipalities across the US were hit with crippling ransomware attacks, while several large companies disclosed data …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
More than 2 million cyber incidents in 2018 created $45 billion in losses
The financial impact of ransomware rose by 60%, losses from business email compromise (BEC) doubled, and cryptojacking incidents more than tripled, all despite the fact that …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105157/hand-400x200.jpeg)
Threat actors are doing their homework, researchers identify new impersonation techniques
There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted …
Featured news
Sponsored
Don't miss
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation
- Cirrus: Open-source Google Cloud forensic collection