data breach
![mask](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112954/mask-400x200.jpg)
Attackers opt for discreet methods to spy inside the network
For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …
![Desk](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112959/desk_type-400x200.jpg)
Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …
![Farmer iPad](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113017/farmer-ipad-400x200.jpg)
FBI warns farming industry about equipment hacks, data breaches
As Internet-connected equipment is increasingly used in many industry sectors, alerts like the latest one issued by the FBI to US farmers will likely become a regular …
![Solutionary report](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113025/solutionary-report-400x200.jpg)
A global data analysis of hostile activity
Solutionary’s latest Global Threat Intelligence Report contains information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195211/business-400x200.jpg)
Exposing the Cybercrime as a Business model
Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …
![Report: The changing face of hacking](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195811/face_of_hacking-400x200.png)
Hacking Team hacker explains how he did it
Some nine moths ago, a hacker that calls himself Phineas Fisher managed to breach the systems and networks of Hacking Team, the (in)famous Italian company that provides …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113738/question-400x200.jpg)
Why few US consumers penalize hacked companies?
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113133/bomb-400x200.jpg)
6,013 breaches reported in the US since 2005
In 2005, the Identity Theft Resource Center (ITRC) began monitoring and tallying the ever-growing number of US security breaches. Since then, the organization has seen a 397 …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113503/building-400x200.jpg)
Panama Papers: A data security disaster
The Panama Papers security breach is a juicy, made-for-the-Internet scandal. It has all the elements – secret off-shore accounts; involvement by international politicians, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113150/lock-symantec-400x200.png)
Cybercriminals are adopting corporate best practices
Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …
![Bomgar survey](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113208/bomgar-survey-400x200.jpg)
Are your vendors leaving you vulnerable?
Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …
![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
Industry reactions to the Mossack Fonseca data breach
The Panama Papers, a collection of 11.5 million files leaked from Panama-based law firm Mossack Fonseca, are now online. The documents show in detail just how exactly the …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD