![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
How cybercriminals are targeting executives at home and their families
Top executives and their families are increasingly being targeted on their personal devices and home networks, as sophisticated threat actors look for new ways to bypass …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103054/ddos-400x200.jpg)
DDoS threats growing in sophistication, size, and frequency
Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations …
![Pay](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/25100332/payment-400x200.jpg)
Contactless is reigning: Consumers can’t even remember their PIN
Marqeta has released its 2022 State of Consumer Money Movement report looking at consumer payment, banking and shopping preferences, showing digital adoption is on the rise. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/13150017/product_month_may2022_1200-400x200.jpg)
Infosec products of the month: May 2022
Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, …
![Microsoft support](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/31094352/microsoft-support-400x200.jpg)
Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)
A newly numbered Windows zero-day vulnerability (CVE-2022-30190) is being exploited in the wild via specially crafted Office documents (without macros), security researchers …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
Zero-trust-washing: Why zero trust architecture is the framework to follow
Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its momentum in the market? It is a …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
57% of all digital crimes in 2021 were scams
Group-IB shares its analysis of the landscape of the most widespread cyber threat in the world: scams. Accounting for 57% of all financially motivated cybercrime, the scam …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100637/handshake-400x200.jpeg)
How effective are public-private partnerships?
Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
There is no good digital transformation without cybersecurity
Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …
![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
HP Wolf Security: A new breed of endpoint protection
Millions of employees are now working from home or in a hybrid setting. Unfortunately for cybersecurity, hackers aren’t confined to office walls. It’s time for your security …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114037/mobile_devices4-400x200.jpg)
$39.5 billion lost to phone scams in last year
Truecaller announced a research conducted in partnership with The Harris Poll in March of 2022, and the findings detail trends/insights on the impact of spam and phone scams …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094714/compliance-400x200.jpg)
Moving toward a more adaptable and tech-driven compliance function
A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality