Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
week in review
Week in review: PolKit vulnerability, fake tax apps pushing malware, EU’s bug bounty for open source

Here’s an overview of some of last week’s most interesting news, articles and interviews: PolKit vulnerability can give attackers root on many Linux distros …

New infosec products of the week: January 28, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Borderless Security, Deepfence, LiveAction, MetricStream, Panorays, Pentera, and …

AI
Why we can’t put all our trust into AI

According to theoretical physicist Michio Kaku, “The human brain has 100 billion neurons, each neuron connected to 10,000 other neurons. Sitting on your shoulders is the most …

ransomware
Ransomware families becoming more sophisticated with newer attack methods

Ivanti, Cyber Security Works and Cyware announced a report which identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26% increase over …

Healthcare
Healthcare industry most common victim of third-party breaches last year

Black Kite released its annual Third-Party Breach Report, which examines the impact of third-party cyber breaches in 2021. Ransomware was the most common attack method behind …

identity theft
Use of AI to fight insurance fraud hits all-time high

Insurers’ use of predictive analytics to fight fraud has reached an all-time high, according to an insurance fraud technology study by the Coalition Against Insurance Fraud …

network
The state of SD-WAN and SASE planning

Aryaka published a report, revealing insights into global SD-WAN and SASE planning. 1,600 information technology (IT) enterprise decision makers across global enterprises …

money
Spending on edge computing to reach $176 billion in 2022

Worldwide spending on edge computing is expected to be $176 billion in 2022, an increase of 14.8% over 2021. Enterprise and service provider spending on hardware, software, …

malware
Stealthy Excel malware putting organizations in crosshairs of ransomware gangs

The HP Wolf Security threat research team identified a wave of attacks utilizing Excel add-in files to spread malware, helping attackers to gain access to targets, and …

hand
Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials

Attackers are trying out a new technique to widen the reach of their phishing campaigns: by using stolen Office 365 credentials, they try to connect rogue Windows devices to …

Android explode
Malware resets Android devices after performing fraudulent wire transfers

If your Android phone initiates a factory reset out of the blue, there’s a chance it has been infected with the BRATA banking malware and you’ve just been ripped …

Log4j
How would zero trust prevent a Log4Shell attack?

There is a seemingly trivial solution to any remote code execution attack, namely: do not to let the inbound traffic match the pattern that triggers the vulnerability of the …

Don't miss

Cybersecurity news