![rorschach ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/06153556/rorschach-ransomware-400x200.jpg)
Rorschach ransomware deployed by misusing a security tool
An unbranded ransomware strain that recently hit a US-based company is being deployed by attackers who are misusing a tool included in a commercial security product, Check …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102836/google-play-fake-crypto-400x200.jpg)
Google Play apps will allow users to initiate in-app account deletion
Google Play will be pushing Android app developers to allow users to delete their account and associated data from within the app. Users will also be given the option to only …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094816/insider_threat-400x200.jpg)
Resecurity uncovers STYX, new cybercriminal platform focused on financial fraud
Resecurity has recently identified the STYX Innovation Marketplace, a new cybercriminal e-commerce platform with a specialized focus on financial fraud and money laundering. …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
IT and security pros pressured to keep quiet about data breaches
Organizations globally are under tremendous pressure to address evolving threats like ransomware, zero-day vulnerabilities, and espionage, and they face challenges in …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/17094314/artificial-intelligence-ai-hns-400x200.jpg)
Assessing AI’s acquired knowledge from an organization’s database
Researchers at the University of Surrey have developed software that can assess the amount of data that an artificial intelligence (AI) system has acquired from a digital …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
The staggering cost of identity fraud for financial services
The impact of identity fraud varies for organizations in the financial services industry, based on whether they belong to the banking or FinTech sector, according to Regula. …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
The hidden picture of malware attack trends
Despite the decline in network-detected malware in Q4 2022, endpoint ransomware spiked by 627%, while malware associated with phishing campaigns persisted as a threat, …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Cyber threats organizations should keep an eye on in 2023
In Malwarebytes’ most recent report on the current state of malware, the company has identified several high-profile cyber threats that organizations should be on the …
![npm](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/05134814/npm-1600x1200px-400x200.jpg)
Flood of malicious packages results in NPM registry DoS
Attackers are exploiting the good reputation and “openness” of the popular public JavaScript software registry NPM to deliver malware and scams, but are also …
![Nicole Hofmann](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/04105911/nicole_hofmann-2-sentryc-400x200.jpg)
Stop online counterfeiters dead in their tracks
During this Help Net Security interview, Nicole Hofmann, CEO at Sentryc, delves into the critical issue of counterfeiting and the detrimental impact it has on industries and …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
The high cost of insecure authentication methods
Insecure authentication is a primary cause of cyber breaches, and that cumbersome login methods take an unacceptable toll on employees and business productivity, according to …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Re-evaluating immature and ineffective insider risk management programs
Managing insider risk is becoming increasingly difficult. In fact, insider risk is emerging as one of the most challenging threats to detect, mitigate and manage, according to …