Protecting organizations by understanding end-of-life software risks
CloudSphere recently released the results of its EOL Management and Risk for IT Assets survey, which reveals the level of confidence individuals have regarding which …
What closed-source software developers can learn from their open-source counterparts
Open-source software has reached greater levels of security than ever before, but its increased adoption comes with new challenges. In this Help Net Security video, Josep …
Medibank hack turned into a data breach: The attackers are demanding money
Medibank, Australia’s largest private health insurance provider, has confirmed that last week’s “cyber incident” has resulted in a data breach. …
How phishing campaigns abuse Google Ad click tracking redirects
PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net …
Want to be a CISO? Being technical is just one of the requirements
As data breaches’ financial and reputational costs continue to reach new heights, cybersecurity should be on top of mind for leadership across every industry. Recent …
Upgrade your security awareness efforts: Here’s how to start
October is Security Awareness Month, an exciting time as organizations around the world train people how to be cyber secure, both at work and at home. But what exactly is …
7 critical steps to defend the healthcare sector against cyber threats
While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. …
Deepfakes: What they are and how to spot them
The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying something they never did or said. …
Economic uncertainty is increasing cybersecurity risks
Cybercriminals are always seeking to make their attacks, scams and campaigns as effective as possible. This includes harnessing whatever is dominating the news agenda and is …
Security stack consolidation helps CISOs lower cybersecurity spending
In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations …
Cost-effective steps healthcare CISOs can take to mitigate damaging attacks
Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick …
How government organizations can stay steps ahead of attackers
Attacks against governments are nothing new. They have been an interesting target since they have existed, for the mere reason that not everyone agrees on how things are run. …
Featured news
Resources
Don't miss
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam