phishing
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100449/email_security2-400x200.jpg)
Top enterprise email threats and how to counter them
A research from Tessian, the State of Email Security Report, found that enterprise email is now the No. 1 threat vector for cyberattacks. According to the report, 94% of …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160326/email-smoke-blue-400x200.jpg)
Unwanted emails steadily creeping into inboxes
A research from Hornetsecurity has revealed that 40.5% of work emails are unwanted. The Cyber Security Report 2023, which analysed more than 25 billion work emails, also …
![snake, threat](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/21113121/snake-coiled-400x200.jpg)
How geopolitical turmoil changed the cybersecurity threat landscape
ENISA, EU’s Agency for Cybersecurity, released its annual Threat Landscape report, covering the period from July 2021 up to July 2022. Cybersecurity threat landscape in …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093728/phishing1-400x200.jpg)
Phishing threats are increasingly convincing and evasive
In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley talks about the impact …
![Microsoft Dynamics 365](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/04123335/microsoft-dynamics-365-400x200.jpg)
Attackers leverage Microsoft Dynamics 365 to phish users
Attackers are abusing Microsoft Dynamics 365 Customer Voice to evade email filters and deliver phishing emails into Microsoft users’ inboxes, Avanan researchers are …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101842/mobile_device-400x200.jpg)
Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers
Preventative medicine has long been recognized as a vital approach in safeguarding our physical health. We take a variety of tests and assessments so that doctors can uncover …
![Dropbox GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/02110432/dropbox-github-400x200.jpg)
130 Dropbox code repos plundered after successful phishing attack
Dropbox has suffered a data breach, but users needn’t worry because the attackers did not gain access to anyone’s Dropbox account, password, or payment information. …
![James Turgal](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/27120517/james_turgal-2-optiv-400x200.jpg)
How to fortify elections and electoral campaigns against human hacking
In this interview for Help Net Security, James Turgal, VP of Cyber Risk, Strategy and Board Relations at Optiv, talks about election cybersecurity and how to keep elections …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
Cyberattacks in healthcare sector more likely to carry financial consequences
Netwrix announced additional findings for the healthcare sector from its global 2022 Cloud Security Report, revealing that 61% of respondents in the healthcare industry …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101053/phishing-400x200.jpg)
DHL takes top spot in brand phishing attempts
Check Point Research has published its Brand Phishing Report for Q3 2022, which highlights the brands which were most frequently imitated by criminals in their attempts to …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/10142333/phishing_red-hns2-400x200.jpg)
How phishing campaigns abuse Google Ad click tracking redirects
PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net …
![car](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/19160749/car-shadow-400x200.jpg)
For auto dealerships, cybersecurity is more essential than ever
Cybercriminals are getting craftier as auto retailers continue to fall victim to well-disguised cyberattacks. According to the second annual dealership cybersecurity study by …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD