Please turn on your JavaScript for this page to function normally.
MITRE ATT&CK
Key MITRE ATT&CK techniques used by cyber attackers

While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy …

botnet
Major shifts in identity, ransomware, and critical infrastructure threat trends

In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top …

Avast
Avast ordered to pay $16.5 million for misuse of user data

The Federal Trade Commission will require software provider Avast to pay $16.5 million and prohibit the company from selling or licensing any web browsing data for advertising …

botnet
The old, not the new: Basic security issues still biggest threat to enterprises

In 2023, cybercriminals saw more opportunities to “log in” versus hack into corporate networks through valid accounts – making this tactic a preferred weapon for …

money
A closer look at Israeli cybersecurity funding and M&A activity in 2023

Last year was challenging for the global market, and the market downturn greatly affected even the historically resilient cybersecurity ecosystem. In this Help Net Security …

Patrick Harding
How decentralized identity is shaping the future of data protection

In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in …

digital identity
Why identity fraud costs organizations millions

92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, …

robot
Cybercriminals get productivity boost with AI

While AI technology has the potential to streamline and automate processes for beneficial outcomes, it also comes with an equal number of risks to data protection, …

shield
Demystifying SOC-as-a-Service (SOCaaS)

Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook …

fire
Malicious logins from suspicious infrastructure fuel identity-based incidents

69% of identity-based incidents involved malicious logins from suspicious infrastructure, which are hosting providers or proxies that aren’t expected for a user or …

laptop
The growing challenge of cyber risk in the age of synthetic media

As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. …

privacy
Verification roadblocks cause frustration for digital nomads

Digital nomads are expressing the most frustration when interacting with organizations offering services in the United States, according to Regula. This revelation comes as a …

Don't miss

Cybersecurity news