![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093637/kubernetes2-400x200.jpg)
Organizations grew to love Kubernetes: Usage in production is high
Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27135730/ransomware_2_27082021-400x200.jpg)
A third of organizations experience a ransomware attack once a week
Ransomware attacks show no sign of slowing. According to new research published by Menlo Security, a third of organizations experience a ransomware attack at least once a …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Universities are at risk of email-based impersonation attacks
Proofpoint released new research which found that the top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/03145658/microsoft-hand-400x200.jpg)
Phishers use custom phishing kit to hijack MFA-protected enterprise Microsoft accounts
An ongoing, large-scale phishing campaign is targeting owners of business email accounts at companies in the FinTech, Lending, Insurance, Energy and Manufacturing sectors in …
![vmware](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/19125355/vmware-1600-hns-400x200.jpg)
VMware: Patch this critical vulnerability immediately! (CVE-2022-31656)
VMware has released fixes for ten vulnerabilities, including CVE-2022-31656, an authentication bypass vulnerability affecting VMware Workspace ONE Access, Identity Manager and …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
How to minimize your exposure to supply chain attacks
Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there are several steps you can take to …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100312/biohazard-400x200.jpg)
87% of the ransomware found on the dark web has been delivered via malicious macros
Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic …
![Privileged Access Management for Dummies](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/29084234/privileged-access-management-ebook-400x200.jpg)
eBook: Privileged Access Management for Dummies
With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it’s time all cybersecurity stakeholders got educated. This …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
“ParseThru” vulnerability allows unauthorized access to cloud-native applications
A new vulnerability found in GoLang-based applications allows a threat actor to bypass validations under certain conditions and gain unauthorized access to cloud-native …
![browser synchronization abuse](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/01154633/browser_sync-400x200.jpg)
Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
Two universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make …
![cybersecurity investments](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/21142945/cybersec_investments-400x200.jpg)
State of cybersecurity funding in the first half of 2022
As the stock market dropped more than 20% in 2022 and prices rise at the pump and grocery store, there are some markets that have shown their ability to weather the storm and …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
Burnout and attrition impact tech teams sustaining modern digital systems
Digitalization and rising consumer expectations are having a major impact on the working conditions of the technology teams sustaining the digital operations that drive the …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality