![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100312/biohazard-400x200.jpg)
87% of the ransomware found on the dark web has been delivered via malicious macros
Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
The most impersonated brand in phishing attacks? Microsoft
Vade announced its H1 2022 Phishers’ Favorites report, a ranking of the top 25 most impersonated brands in phishing attacks. Microsoft came in at #1 on the list, followed by …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/02131300/question-400x200.jpg)
1 in 3 employees don’t understand why cybersecurity is important
According to a new Tessian report, 30% employees do not think they personally play a role in maintaining their company’s cybersecurity posture. What’s more, only 39% of …
![data breach cost](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/27070657/data_breach_cost-400x200.jpg)
The global average cost of a data breach reaches an all-time high of $4.35 million
IBM Security released the 2022 Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
How SMBs are evolving their cybersecurity operations practices
While 81% of SMBs are monitored by a security operations center (SOC), 57% do not operate 24 hours a day, 7 days a week. Considering that 69% of SMBs feel they are facing …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093824/money-400x200.jpg)
Cybercrime goods and services are cheap and plentiful
Cybercrime is being supercharged through “plug and play” malware kits that make it easier than ever to launch attacks. Cyber syndicates are collaborating with amateur …
![containers](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095724/containers-400x200.jpg)
Infosec pros want more industry cooperation and support for open standards
Driven by security operations complexity, 46% of organizations are consolidating or plan on consolidating the number of vendors they do business with. As a result of this …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112257/vault-400x200.jpg)
Trust in fintech security has been wavering
In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
Visibility into runtime threats against mobile apps and APIs still lacking
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095907/industry-mirror-400x200.jpg)
Industrial cybersecurity leaders are making considerable headway
Increased cyber threats and government directives have made cybersecurity a top priority among critical infrastructure organizations. A zero trust security architecture is the …
![Fraud losses](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/23150627/fraud_losses_red-400x200.jpg)
Online payment fraud losses to exceed $343 billion
Cumulative merchant losses to online payment fraud globally between 2023 and 2027 will exceed $343 billion, according to Juniper Research. As a comparison, this equates to …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15084105/log4j-hns-bw-400x200.jpg)
How to address the ongoing risk of Log4j exploitation and prepare for the future
“Vulnerable instances of Log4j will remain in systems for many years to come, perhaps a decade or longer,” the Cyber Safety Review Board (CSRB) has concluded. …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?