
Credential phishing attacks skyrocketing, 265 brands impersonated in H1 2022
Abnormal Security released a report which explores the current email threat landscape and provides insight into the latest advanced email attack trends, including increases in …

Malicious PyPI packages drop ransomware, fileless malware
In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses newly found PyPI packages that pack ransomware, and another package that appears …

Ransomware is not going anywhere: Attacks are up 24%
Avast released a report revealing a significant increase in global ransomware attacks, up 24% from Q1/2022. Researchers also uncovered a new zero-day exploit in Chrome, as …

Organizations would like the government to help with ransomware demand costs
Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over …

The impact of exploitable misconfigurations on network security
Network professionals feel confident with their security and compliance practices but data suggests that they also leave their organizations open to risk, which is costing a …

LogoKit update: The phishing kit leveraging open redirect vulnerabilities
Resecurity identified threat actors leveraging open redirect vulnerabilities in online services and apps to bypass spam filters to ultimately deliver phishing content. Using …

Now is the time to focus on software supply chain security improvements
The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

Only 25% of organizations consider their biggest threat to be from inside the business
A worrying 73.48% of organizations feel they have wasted the majority of their cybersecurity budget on failing to remediate threats, despite having an over-abundance of …

Visibility into runtime threats against mobile apps and APIs still lacking
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

What NATO’s virtual rapid response cyber capability means for the fight against cyber warfare
At the recent meeting of the North Atlantic Council in Madrid, NATO heads of state agreed to boost resilience to cyber and hybrid threats. NATO members will strengthen their …

The impact of DNS attacks on global organizations
Often we see stories about cyber attacks that breached an organisations’ security parameters, and advice on how we can protect against future threats. However, what is often …

Is the UK government prepared for its greatest threat?
Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency (CISA), has warned the UK government that they could be the victim of a 9/11-style …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)