![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
New threat groups and malware families emerging
Mandiant announced the findings of an annual report that provides timely data and insights based on frontline investigations and remediations of high-impact cyber attacks …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13142728/bomb-clock-time-400x200.jpg)
How fast do cybercriminals capitalize on new security weaknesses?
Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
Financial leaders grappling with more aggressive and sophisticated attack methods
VMware released a report which takes the pulse of the financial industry’s top CISOs and security leaders on the changing behavior of cybercriminal cartels and the defensive …
![snake, threat](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/21113121/snake-coiled-400x200.jpg)
Strengthening the ability of public companies to combat cybersecurity threats
The National Association of Corporate Directors (NACD), SecurityScorecard and the Cyber Threat Alliance released a report that examines the U.S. Securities and Exchange …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/06180713/open_source_cloud-hns-400x200.jpg)
Challenges development teams face when building applications with open source
Tidelift released a report providing critical insights into the state and practice of open source software supply chain management. This comprehensive study of nearly 700 …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/06144957/open-source-code-hns-400x200.jpg)
81% of codebases contain known open source vulnerabilities
Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and …
![transform](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102903/transform-400x200.jpeg)
The price of an accelerated digital transformation
F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094843/person-400x200.jpg)
Unmanaged and unsecured digital identities are driving rise in cybersecurity debt
A global report released by CyberArk shows that 79% of senior security professionals state that cybersecurity has taken a back seat in the last year in favor of accelerating …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
Dark data is a pain point for many security leaders
BigID published a research report exploring today’s challenges organizations face with protecting their most valuable data. The study uncovered a number of critical findings: …
![ransomware payments](https://img.helpnetsecurity.com/wp-content/uploads/2021/06/16110606/ransomware_payments-400x200.jpg)
2021 average ransoms paid by quarter was $167K, down 44.2%
In reviewing the evolving cyber risk landscape, a Corvus Insurance report includes a breakdown of the impact of zero-days and third-party risk, updates on ransom severity, …
![Shark](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/27103738/shark-vuln-400x200.jpg)
Cybersecurity is getting harder: More threats, more complexity, fewer people
Splunk and Enterprise Strategy Group released a global research report that examines the security issues facing the modern enterprise. More than 1,200 security leaders …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100112/healthcare-400x200.jpg)
Lack of data readiness threatens digital transformation in healthcare
A majority of healthcare leaders have established digital transformation as a top priority spurred by the pandemic, yet they’re facing a chronic, underlying challenge that’s …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?