![employee](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110112/employee-400x200.jpg)
Removing admin rights mitigates most critical Microsoft vulnerabilities
Avecto has analyzed the security bulletins Microsoft released in the past year, and came to an important conclusion: an overwhelming majority of all the critical Microsoft …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
Data breaches becoming more complex, pervasive and damaging
Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Russian-speaking cybercriminals created over 75% of all crypto ransomware
According to the Kaspersky Lab’s telemetry, in 2016 more than 1,445,000 users (including businesses) around the globe were attacked by 54 thousand modifications of 60+ …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
40% of cloud services are commissioned without the involvement of IT
Intel Security released its second annual cloud security report, “Building Trust in a Cloudy Sky,” at RSA Conference 2017. The report outlines the current state of cloud …
![Industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112121/cooling-tower-1368823_1920-400x200.jpg)
Cybersecurity advice for the nuclear industry
Less complexity, an active defense, transformative research, and institutionalized cybersecurity should be nuclear industry’s key priorities to stem the rising tide of …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Unregulated use of facial recognition tech threatens people’s privacy, civil rights
Facial recognition tech is a boon to law enforcement, but without strict regulation and safeguards, it poses considerable risks to the privacy, civil liberties, and civil …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112229/eye-400x200.jpg)
Kazakhstan govt targeted journalists, political activists with spyware
Journalists and political activists critical of Kazakhstan’s authoritarian government, along with their family members, lawyers, and associates, have been targets of an online …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112231/sap2-400x200.jpg)
36000 SAP systems exposed online, most open to attacks
ERPScan released the first comprehensive SAP Cybersecurity Threat Report, which covers three main angles: Product Security, Implementation Security, and Security Awareness. …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
Russian ransomware boss earns $90,000 per year
Despite too many users not even being aware of the existence of the ransomware threat, there is no doubt that it’s currently one of the most popular ways for cyber …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112812/danger-400x200.jpg)
The gravest dangers for CMS-based websites
Over a third of all websites on the Internet are powered by one of these four key open source platforms: WordPress, Joomla!, Drupal and Magento. This makes the life of …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Exploit kits are the greatest danger for Windows users
Exploit kits are how most malware gets on victims’ computers and, according to Microsoft, encounters with exploit kits increased by more than a third from 3Q15 to 4Q15. …
![abstract broken connections](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113050/abstract-broken-connections-400x200.jpg)
US government is lousy at cybersecurity
SecurityScorecard released its 2016 Government Cybersecurity Report, a comprehensive analysis that exposes alarming cybersecurity vulnerabilities across 600 local, state, and …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders