Please turn on your JavaScript for this page to function normally.
cloud
Complexity and budgetary constraints complicate cloud security

While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …

Facebook
Facebook Messenger users targeted by a large-scale scam

A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …

lock
Consumer data protection is a high priority, but there’s still work to be done

Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

coronavirus
COVID-19-themed cyberattack detections continue to surge

McAfee released its new report, examining cybercriminal activity related to malware and the evolution of cyber threats in the third and fourth quarters of 2020. In Q4, there …

money
Payment transaction volume using 3-D Secure protocol grows globally

RSA has published its latest quarterly fraud report, reinforcing the migration to more precise payment authentication methods and showing a notable spike in brand abuse …

security awareness
Five steps to get employees invested in security awareness training

Remote work has become a new normal for industries worldwide, which presents exciting opportunities but also has the potential to expose critical security weaknesses, since …

bot
Bad bot traffic reaching an all-time high over the past year

In 2020, Imperva saw the highest percentage of bad bot traffic (25.6%) since 2014, while traffic from humans fell by 5.7%. More than 40% of all web traffic requests originated …

glasses
Protecting the human attack surface from the next ransomware attack

As we head into 2021, ransomware is making another resurgence, particularly in targeted attacks from highly organized hacker groups. In fact, cybercrime is surging since the …

brain
Machine learning-powered cybersecurity depends on good data and experience

According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …

ransomware
Detection capabilities improve, but ransomware surges on

A FireEye report outlines critical details on trending attacker techniques and malware, the proliferation of multifaceted extortion and ransomware, preparing for expected …

virtual reality
The SOC is blind to the attackable surface

A security operations center (SOC) is the central nervous system of any advanced cybersecurity program. Yet even the most well-funded, highly organized and properly equipped …

fast
The benefits of cyber threat intelligence

In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. He also talks about how …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools