cybercriminals
![M-Trends 2020 Report](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/21095453/m-trends2020-400x200.jpg)
Increased monetization means more ransomware attacks
Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps
44% of malicious threats are cloud enabled, meaning that cybercriminals see the cloud as an effective method for subverting detection, according to Netskope. “We are seeing …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
Most credential abuse attacks against the financial sector targeted APIs
From May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targeting APIs, in an effort to bypass security controls. …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
Number of records exposed in healthcare breaches doubled from 2018 to 2019
In 2019, healthcare data breaches collectively affected over 27 million individuals, according to Bitglass. Categories of breaches Hacking or IT incidents: Breaches related to …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
A closer look at the global threat landscape
60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100833/password-400x200.jpg)
Credential exposure report: Poor password habits still pose a serious threat
9,050,064,764 credentials have been recovered throughout 2019 which came from a total of 640 unique data breaches and include email addresses connected to plaintext passwords …
![Vade Secure phishing report](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/08123659/phishing-vadesecure-022020-400x200.jpg)
The 25 most impersonated brands in phishing attacks
PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, …
![NIST JTAG](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/03155912/nist-jtag-400x200.jpg)
Scientists test forensic methods to acquire data from damaged mobile phones
Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Are businesses prepared for an extinction-level cyber event?
In an era of technological transformation and cyber everywhere, the attack surface is exponentially growing as cyber criminals attack operational systems and backup …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Over half of organizations were successfully phished in 2019
Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102357/money-danger-400x200.jpg)
Emotet remains the dark market leader for delivery-as-a-service
The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations