enterprise
![working](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095257/working-400x200.jpeg)
How today’s workforce stays secure and what apps it prefers
User-focused security apps KnowBe4, LastPass, and Proofpoint dominate the list of fastest growing apps within enterprises, according to Okta. “KnowBe4 in particular is …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102012/hand_computer-400x200.jpeg)
What do successful pentesting attacks have in common?
In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft rolls out new tools for enterprise security and compliance teams
Microsoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new …
![Swiss army knife](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095340/swiss_army_knife-400x200.jpg)
Emotet: A veritable Swiss Army knife of malicious capabilities
Formerly just a banking Trojan, Emotet is now one of the most dangerous and multifaceted malware out there. According to Malwarebytes, it and Trickbot are part of the reason …
![cloud proliferation](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103948/clouds-400x200.jpg)
Vulnerable cloud infrastructure experiencing increasing attacks
Attackers are increasingly targeting vulnerable cloud infrastructure to exploit it for covert cryptojacking or to deliver ransomware, Securonix researchers warn. Some attacks …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103023/target-400x200.jpg)
Cybercriminals increasingly taking aim at businesses
2018 has been the year when cryptominers first dethroned ransomware as the most prevalent threat due to a meteoric spike in Bitcoin value in late 2017, then slowly trailed off …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103857/bec_scams-400x200.jpg)
BEC scammers add payroll diversion to their repertoire
All the attention the most typical BEC scams have been receiving in the last few years must have affected their effectiveness and forced scammers to come up with new ways for …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Criminals wielding Ryuk ransomware specialize in targeting enterprises
A cybercriminal group dubbed Grim Spider has been using the Ryuk ransomware to exclusively target enterprises and has managed to amass over 705 Bitcoins (around $3.7 million) …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103303/office365-400x200.jpg)
Mitigating the risk of Office 365 account hijacking
Office 365 – the online, subscription-based version of Microsoft’s Office application suite – is one the most widely used enterprise cloud applications/services, …
![Pathe](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095730/pathe-400x200.jpg)
BEC scammers stole €19m from film company Pathé
The Dutch branch of the French film production and distribution company Pathé has lost over 19 million euros to BEC scammers, Dutch News reported. The scam Information about …
![Stethoscope](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095828/stethoscope-400x200.jpg)
Netflix releases desktop versions of device security app Stethoscope
In early 2017, the Netflix team open sourced Stethoscope, an application that collects information about users’ devices and provides them with recommendations for securing …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095934/tunnel-1-400x200.jpg)
Safeguarding hybrid-cloud infrastructures through identity privilege management
Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)