cybercriminals
![Twitter](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194505/twitter-logo-400x200.jpg)
While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts
Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
50% of organizations believe attackers can infiltrate their networks each time they try
As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Every minute, $2.9 million is lost to cybercrime
Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion, according to RiskIQ. Top companies pay $25 per minute due to security …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093943/complex-400x200.jpg)
Multi-stage attack techniques are making network defense difficult
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Insights into end-user security awareness and behavior around phishing
Phishing remains a leading concern for organizations worldwide. A new Proofpoint report features analysis of data related to nearly 130 million cybersecurity questions and …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
More than 2 million cyber incidents in 2018 created $45 billion in losses
The financial impact of ransomware rose by 60%, losses from business email compromise (BEC) doubled, and cryptojacking incidents more than tripled, all despite the fact that …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
Cybersecurity professionals are outgunned and burned out
Nearly half (48 percent total) of cybersecurity leaders across France, Germany and the UK believe their teams are falling behind in the skills race against would-be cyber …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
Where are organizations stalling with cybersecurity best practices?
UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced, according to NTT Security. …
![Password](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095338/password_field-400x200.jpg)
Insecure password memory aids: A passwordless future could be the solution
There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The …
![wildlife](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094131/wildlife-400x200.jpg)
New EU-funded project aims to disrupt wildlife cybercrime
A new European Union (EU)-funded project aims to disrupt criminals trafficking wildlife in or via the EU using the internet, postal or fast parcel services. The project is …
![gamer](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095510/gamer-400x200.jpg)
The gaming community is a rising target for credential stuffing attacks
Hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
Code signing keys and certificates are crucial security assets, are you protecting them?
Only 28 percent of organizations consistently enforce a defined security process for code signing certificates, a Venafi study of over 320 security professionals in the U.S., …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations