Outdated infrastructure remains a problem against sophisticated cyberattacks
A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …
Financial organizations fail to act on firmware breaches
In this Help Net Security video, Michael Thelander, Director Product Marketing at Eclypsium, discusses how financial organizations are failing to act despite the majority …
Cybercriminals are changing focus from large hospitals to smaller hospital systems
Critical Insight announced the release of the firm’s H1 2022 Healthcare Data Breach Report, which analyzes breach data reported to the United States Department of Health and …
The challenges of achieving ISO 27001
ISO 27001 is a widely-known international standard on how to manage information security. In this Help Net Security video, Nicky Whiting, Director of Consultancy, Defense.com, …
Criminals harvest users’ PI by impersonating popular brands
Hornetsecurity released an Email Threat Review, which cited a decline in Excel attacks, but reported a sharp increase in Intuit phishing attacks. This Help Net Security video …
The top apps for malware downloads
In July 2022, one third of all malware downloads came from cloud apps. The overwhelming majority of the downloads were trojans, a type of malware that is disguised as …
High-profile vulnerabilities encourage organizations to improve security posture
As organizations go about their regular routine of finding and adding new technologies to help increase their overall success, each organization must keep in mind the security …
Defeat social engineering attacks by growing your cyber resilience
In this Help Net Security video, Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions, discusses the innovation behind social engineering campaigns …
Apple strengthens security and privacy in iOS 16
Apple announced additional security and privacy updates for its newest mobile operating system. In this Help Net Security video, you’ll learn more about the latest privacy and …
Use of machine identities is growing in state-sponsored cyberattacks
66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been …
Ransomware remains the number one threat to businesses and government organizations
Acronis researchers have concluded that ransomware continues to be the number one threat to large and medium-sized businesses, including government organizations. This Help …
Malicious DNS traffic targets corporate and personal devices
Akamai’s security research team examined potentially compromised devices, discovering that 12.3% communicated with domains associated with malware or ransomware during Q2 …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints