Please turn on your JavaScript for this page to function normally.
CIS Hardened Images
Whitepaper: Shared responsibility model for cloud security

With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources …

application
Most missed area of zero trust: Unmanageable applications

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer of Cerby, talks about the likely hole in your security strategy. This video zeroes in on one of the most …

cryptocurrency
Scams targeting cryptocurrency enthusiasts are getting more prevalent

Crypto giveaway scams have evolved into an illicit market segment with multiple services that aim to facilitate fraudulent operations. The growth of fake crypto giveaways can …

snake, threat
Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide

In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and …

bomb
Economic strife fuels cyber anxiety

The 2022 SonicWall Threat Mindset Survey found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused on financially motivated …

lock
What consumers expect from organizations that handle their personal data

In this Help Net Security video, Robert Waitman, Privacy Director and Head of Privacy Research Program at Cisco, discusses the key findings of Cisco’s 2022 Consumer …

Support
Protecting organizations by understanding end-of-life software risks

CloudSphere recently released the results of its EOL Management and Risk for IT Assets survey, which reveals the level of confidence individuals have regarding which …

social engineering attacks
Social engineering attacks anybody could fall victim to

Social engineering – also known as human hacking – is an expression that encompasses a number of methods and vectors attackers use to manipulate targets into …

Shadowserver
Shadowserver: Get free access to timely, critical Internet security data

The Shadowserver Foundation fulfills a unique role in the cybersecurity ecosystem by supplying vital security information to Internet defenders and law enforcement at no cost. …

How supply chain threats will evolve in 2023

Software supply chain risk has grown to be a significant concern for organizations as cyber attackers look to take advantage of the accelerating digitalization that has seen …

phishing
How phishing campaigns abuse Google Ad click tracking redirects

PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net …

riskiest connected devices
The most dangerous connected devices

The growing number and diversity of connected devices in every industry present new challenges for organizations to understand and manage the risks they are exposed to. In …

Don't miss

Cybersecurity news