![Cloud lock](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195700/twitter-cloud5-400x200.jpg)
IT use of cloud surges to record heights
The cloud has reached the point where businesses are no longer debating whether or not to use cloud, but how pervasively they will use it. A new North Bridge survey shows …
![network cables](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195703/twitter-napatech1-400x200.jpg)
Will 2016 be the year of the 100G network?
100G Ethernet networks will be deployed much faster and more broadly than previously expected. Based on the influence of new paradigms currently emerging like SDN, NFV, Big …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195712/broken-window-960188_1280-400x200.jpg)
Asian company is the newest APT threat
An unnamed South Asian software development consultancy that creates software for employee monitoring is also an APT player and, according to CloudSek CTO Rahul Sasi, it …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Critical RCE bug in FireEye’s security appliances exploitable via email
Last week, FireEye has silently pushed out a patch for an extremely easy-to-exploit remote code execution bug affecting its NX, EX, FX and AX Series security appliances in …
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09194358/rsaconference-connect-400x200.jpg)
RSA Conference 2016: Connect to protect
RSA Conference, the premiere series of global events, once again sets the stage for the world to talk – and challenge – information security trends during the annual U.S. …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
New threats will demand new approaches such as micro-segmentation and quantum encryption
Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …
Surge in global cloud application adoption
Cloud application adoption across all industries increased more than 71 percent in 2015, according to Bitglass. Their global report was compiled through an automated, …
![Security](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195724/security-265130_1280-1-400x200.jpg)
Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Comcast users hit with malvertising, malware and tech support scam all in one go
Another tech support scam / ransomware campaign combo has been launched at users, but this time the order of delivery is reversed. The intended victims are the customers of …
![GCHQ](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195732/GCHQ-aerial-400x200.jpg)
GCHQ open sources Gaffer, a data collection and mining framework
GCHQ, the UK equivalent of the US National Security Agency (NSA), has released on Monday the source code of Gaffer, a graph database that optimised for “retrieving data …
![Joomla](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195735/maxresdefault-1-400x200.jpg)
Critical Joomla RCE bug actively exploited, patch immediately!
An eight-year-old Joomla critical remote code execution vulnerability, which is being actively exploited in attacks in the wild, has been patched by the developers of the …
![MacKeeper](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195738/mackeeper-400x200.jpg)
13 million MacKeeper users exposed in data breach
The company pushing MacKeeper, the security and utility software suite for Macs many consider to be scareware, has confirmed that the database containing passwords and …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days