![patch](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08184752/patch_bkg5-400x200.jpg)
April 2021 Patch Tuesday forecast: Security best practices
March kept us all very busy with the ongoing out-of-band Microsoft updates for Exchange Server and the printing BSODs, which plagued us since last Patch Tuesday. It looks like …
![infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/09125335/infosec_week-400x200.jpg)
New infosec products of the week: April 9, 2021
VMware increases visibility, enables compliance and enhances security for containerized applications VMware unveiled expanded cloud workload protection capabilities to deliver …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093257/light-400x200.jpg)
Having a cybersecurity training program in place isn’t enough to ensure cyber safety
With cyberattacks increasing dramatically after the pandemic, TalentLMS and Kenna Security teamed up to gauge employees’ awareness and knowledge of cybersecurity risks. While …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Cybersecurity threats and cybercrime trends of 2020
Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. “Our 2020 findings depict consumers under constant …
![cloud VPN](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/02160005/cloud_vpn-400x200.jpg)
Most organizations have already migrated to a cloud VPN
The majority of organizations have already migrated their VPN solution to the cloud, a NetMotion survey reveals. A study surveyed 750 leaders working in IT, security and …
![work from home](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/28085110/wfh-desk-400x200.jpg)
Remote work: One of the legacies of the pandemic
An expectation on the part of workers that they will be allowed to work remotely more often will be one of the legacies of the pandemic, according to a study by Boston …
![mobile payment](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110344/mobile_payment-400x200.jpg)
How global markets are adopting real-time payments
More than 70.3 billion real-time payments transactions were processed globally in 2020, a surge of 41 percent compared to the previous year, as the COVID-19 pandemic …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092758/office365-3-400x200.jpg)
Office 365 phishing campaign uses publicly hosted JavaScript code
A new phishing campaign targeting Office 365 users cleverly tries to bypass email security protections by combining chunks of HTML code delivered via publicly hosted …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/17081348/table-idea-400x200.jpg)
4 things you can do to minimize cyberattacks on supply and value chains
Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds hack was a classic supply chain attack, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Cloud-native watering hole attack: Simple and potentially devastating
In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
A rush to remote working leaving businesses vulnerable to cybercriminals
The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Verizon reveals that many businesses may …
![Google Forms](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07145043/google_forms-400x200.jpg)
Cybercriminals are using Telegram bots, Google Forms to gather stolen user data
Cybercriminals are increasingly using legitimate services such as Google Forms and Telegram to gather user data stolen on phishing websites. Alternative ways to collect data …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about