![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105121/phishing-400x200.jpg)
Phishing trends: Who is targeted and why
The business model of phishing has evolved. The bad guys have found ways to multiply their profits at the expense of organizations they aren’t even attacking directly, …
![Search](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112405/search-threat-400x200.jpg)
Monitoring scanning activities that could lead to IoT compromises
IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
Number of disclosed vulnerabilities reaches all time high in 2016
A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105147/certificate-400x200.jpg)
Scale, frequency and causes of certificate-related outages
Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110235/building-400x200.jpg)
Identity fraud hits record high
The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
AppSec teams facing resourcing issues that are making them vulnerable
A new Bugcrowd study of one hundred CISOs revealed that 94 percent are concerned about breaches in their publicly facing assets in the next 12 months, particularly within …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
CSOs reveal true cost of breaches
Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …
![SSD](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105206/ssd-400x200.jpg)
SSD security challenges: Which data sanitization methods are effective?
In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. Organizations face a myriad of internal and …
![world biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112821/world-biohazard-400x200.jpg)
The emergence of new global cybercriminal attack patterns
The findings of a new Malwarebytes report illustrate a significant shift in cybercriminal attack and malware methodology from previous years. Ransomware, ad fraud and botnets, …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
Irregular application testing: App security in healthcare
Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
Machine learning in cybersecurity will boost big data, intelligence, and analytics spending
Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages within the next year. As a result, the …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105450/fire-400x200.jpg)
Increasingly sophisticated attacks call for advanced protection tools
A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality