![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110954/cloud-simple-400x200.jpg)
Cloud security market in the retail sector expected to grow
The global cloud security market in the retail sector is expected to grow at a CAGR of close to 21% until 2020, according to Technavio. Cloud security is a technology designed …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113844/attacks-400x200.jpg)
Compromising Linux virtual machines via FFS Rowhammer attack
A group of Dutch researchers have demonstrated a variant of the Rowhammer attack that can be used to successfully compromise Linux virtual machines on cloud servers. The Flip …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112208/windows-400x200.jpg)
Windows users will no longer be able to apply individual patches
Since Microsoft began pushing Windows 10 on consumers and enterprise users, it has consistently worked towards minimizing the choices they can make about the installation. One …
![Cisco network](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195215/cisco-network-400x200.jpg)
Cisco, Fortinet validate exploits leaked by the Shadow Brokers
Cisco and Fortinet have released security advisories confirming that some of the exploits leaked by the Shadow Brokers work as intended. The entity released the batch as proof …
![City](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110957/city-dark-400x200.jpg)
Hacking smart cities: Dangerous connections
Once just a curiosity for technology enthusiasts, the Internet of Things (IoT) has become mainstream. In fact, the IoT security market is estimated to grow from USD 7.90 …
![Sn1per](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111000/sn1per-400x200.jpg)
Sn1per: Automated pentest recon scanner
Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. “I originally created Sn1per because I didn’t want …
![entrepreneur](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113159/entrepreneur-400x200.jpg)
Lack of security talent is a threat to corporate safety
Large businesses with a small amount of full-time security experts pay almost three times more to recover from a cyberattack than those businesses with in-house expertise, …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Five tips to help execute an employee training program
One of the best ways to reduce the risk of data breaches is employee training. This is particularly important during the fall “back to business” season when many …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
New wave of targeted attacks focus on industrial organizations
Kaspersky Lab researchers discovered a new wave of targeted attacks against the industrial and engineering sectors in 30 countries around the world. Dubbed Operation Ghoul, …
![black hat seo](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113303/black_hat_seo-400x200.jpg)
Spammers modify sites’ core WordPress files for long-lasting compromise
In their quest to compromise WordPress installations and prevent site owners from discovering it and cleaning up the website, blackhat SEO spammers have turned to modifying …
![NSA](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194610/nsa-400x200.jpg)
Leaked hacking tools can be tied to NSA’s Equation Group
The batch of data released by the Shadow Brokers, an entity that claims to have hacked the Equation Group, contains attack tools that can be tied to the group. Equation Group …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Organizations still unprepared for malicious insiders
Organizations globally believe they are their own worst enemy when it comes to cybersecurity, with 45 percent saying they are ill-equipped to cope with the threat of malicious …
Featured news
Sponsored
Don't miss
- CrowdStrike engages external experts, details causes of massive outage
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner