Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
SolarWinds
New SolarWinds Serv-U vulnerability targeted in Log4j-related attacks

Attackers looking to exploit recently discovered Log4j vulnerabilities are also trying to take advantage of a previously undisclosed vulnerability in the SolarWinds Serv-U …

Magnify
The evolution of security analytics

As networks continue to evolve and security threats get more complex, security analytics plays an increasingly critical role in securing the enterprise. By combining software, …

biohazard
Endpoint malware and ransomware detections hit all-time high

Endpoint malware and ransomware detections surpassed the total volume seen in 2020 by the end of Q3 2021, according to researchers at the WatchGuard Threat Lab. In its latest …

risk
Cyber risks top worldwide business concerns in 2022

Cyber perils are the biggest concern for companies globally in 2022, according to the Allianz Risk Barometer. The threat of ransomware attacks, data breaches or major IT …

skull
Software supply chain attacks jumped over 300% in 2021

Software supply chain attacks grew by more than 300% in 2021 compared to 2020, according to a study by Argon Security. According to the study, researchers discovered attackers …

cloud
Multicloud environment complexities putting digital transformation at risk

Dynatrace announced the findings of an independent global survey of 1,300 CIOs and senior IT practitioners involved in infrastructure management. The research reveals the …

Cryptocurrency market to reach $2.73 billion in 2025

The global cryptocurrency market is expected to grow from $1.44 billion in 2020 to $1.63 billion in 2021 at a compound annual growth rate (CAGR) of 12.9%. The market is …

U.S. Department of Labor (DOL)
Phishers go after business email credentials by impersonating U.S. DOL

Phishers are trying to harvest credentials for Office 365 or other business email accounts by impersonating the U.S. Department of Labor (DOL), Inky‘s researchers have …

fix
Cultivating a security-first mindset for software developers

There is a “great cyber security awakening” happening across companies. Right now, we need a fundamental new approach to development, so we are not constantly firefighting. …

cloud storage
What are the barriers to moving legacy data to the cloud?

While 95% of tech leaders worldwide say moving their legacy application data to the cloud is a priority, and 80.5% want to do it within the next 12 months, only 35% of tech …

Adaptive Shield SSPM
Product showcase: Adaptive Shield SaaS Security Posture Management

Whether it’s Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of …

arrows
Supply chain disruptions rose in 2021

56% of businesses experienced more supply chain disruptions in 2021 than 2020, a Hubs report reveals. Last year was marked by a number of challenges, including computer chip …

Don't miss

Cybersecurity news