vulnerability
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/17172120/lock-green-connect-400x200.jpg)
Digital business requires a security-first mindset
Security is an undeniable necessity for the survival and success of any company. COVID-19 accelerated digital transformation initiatives across all industries and this shift …
![coronavirus](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/11083105/coronavirus-blue-threats-400x200.jpg)
COVID-19-themed cyberattack detections continue to surge
McAfee released its new report, examining cybercriminal activity related to malware and the evolution of cyber threats in the third and fourth quarters of 2020. In Q4, there …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Protecting the human attack surface from the next ransomware attack
As we head into 2021, ransomware is making another resurgence, particularly in targeted attacks from highly organized hacker groups. In fact, cybercrime is surging since the …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13113507/opensource-blue-400x200.jpg)
Open source security, license compliance, and maintenance issues are pervasive in every industry
Synopsys released a report that examines the results of more than 1,500 audits of commercial codebases. The report highlights trends in open source usage within commercial …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
Machine learning-powered cybersecurity depends on good data and experience
According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/08194013/microsoft_exchange_2020-1-400x200.jpg)
FBI removes web shells from hacked Microsoft Exchange servers
Authorities have executed a court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable on-premises versions of Microsoft Exchange Server …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
330 million people across 10 countries were victims of cybercrime in 2020
Over the past year, 65% of people around the world report spending more time online than ever before, likely a result of the COVID-19 pandemic. As we connected to the internet …
![DNS](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19131052/dns-world-400x200.jpg)
New DNS vulnerabilities have the potential to impact millions of devices
Forescout Research Labs, in partnership with JSOF, disclosed a new set of DNS vulnerabilities, dubbed NAME:WRECK. These vulnerabilities affect four popular TCP/IP stacks …
![hotel](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/06193845/hotel-key-secure-400x200.jpg)
Cybersecurity guide for the hospitality industry
A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
The SOC is blind to the attackable surface
A security operations center (SOC) is the central nervous system of any advanced cybersecurity program. Yet even the most well-funded, highly organized and properly equipped …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Cloud-native watering hole attack: Simple and potentially devastating
In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
A rush to remote working leaving businesses vulnerable to cybercriminals
The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Verizon reveals that many businesses may …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?