cybercriminals
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100018/bomb-400x200.jpg)
Cybercriminals continue to evolve the sophistication of their attack methods
Cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding for some attacks, to living-off-the-land (LoTL) or …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Phishing targeting SaaS and webmail services increased to 36% of all phishing attacks
Users of Software-as-a-Service (SaaS) and webmail services are being targeted with increasing frequency, according to the APWG Q1 2019 Phishing Activity Trends Report. The …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Cybercriminals continue to target intellectual property, putting brand reputation at risk
Despite improvements in combating cybercrime and threats, IT security professionals are still struggling to fully secure their organization and protect against breaches with …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
Cybercriminals are becoming more methodical and adaptive
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102608/healthcare-400x200.jpg)
Legacy infrastructures and unmanaged devices top security risks in the healthcare industry
The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Cost of telecommunications fraud estimated at €29 billion a year
As our society evolves, so does our reliance on telecommunications technology. Cybercriminals prey on our daily use of electronic devices and continuously seek out new ways to …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112935/ddos-400x200.jpg)
Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites
The FBI’s shutdown of the 15 largest distributed denial-of-service (DDoS) for hire vendors (booters) reduced the overall number of attacks worldwide by nearly 11 percent …
![quantum](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104847/quantum-400x200.jpg)
Enterprises are blind to over half of malware sent to their employees
As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103418/question-400x200.jpg)
Businesses need to rethink security priorities due to shifting trends
One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Half of business leaders say a breach could end their business, others remain unaware
A majority (58 percent) of executives at SMBs are more concerned about suffering a major data breach than a flood, a fire, a transit strike or even a physical break-in of …
![IoT security](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110405/iot-security-400x200.jpg)
Researchers and businesses need to work together to expose IoT vulnerabilities
As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things. Two new vulnerabilities …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
Increasing security measures are driving cybercriminals to alter their techniques
Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). Total recorded vulnerabilities …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations