Please turn on your JavaScript for this page to function normally.
search
Increasing speed of vulnerability scans ultimately increases security fixes overall

Next-generation static application security testing (SAST) and intelligent software composition analysis (SCA) can increase the speed of vulnerability scans and narrow their …

hunt
CyberCops program: ROTC students as future cybersecurity gatekeepers

Not so long ago, a strong password felt mighty enough to keep you safe and your computer data private. But we now live amid heightened risks in malware, phishing, …

Tomislav Pericin
The destructive power of supply chain attacks and how to secure your code

In this Help Net Security podcast, Tomislav Peričin, Chief Software Architect at ReversingLabs, explains the latest and most destructive supply chain attacks, their techniques …

arrows
RIP guest access, long live shared channels!

While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …

cloud complexity
How to build a zero-trust cloud data architecture

Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …

DDoS
Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack …

dark
Cybercriminals are manipulating reality to reshape the modern threat landscape

VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive …

Code
Ineffective software delivery costing businesses up to $126 million per year

Businesses may be sacrificing up to $126 million in revenue per year due to ineffective software delivery, according to a CircleCI study. Surveying more than 2,000 business …

5G
5G infrastructure market size to reach $80.5 billion by 2028

The global 5G infrastructure market size is expected to reach $80.5 billion by 2028, according to a study by Grand View Research. It is expected to expand at a CAGR of 49.8% …

SAP
SAP S/4HANA adoption rebounds as enterprises look to minimize business disruption

U.S. adoption of SAP S/4HANA has rebounded after slowing for most of 2020 as the COVID-19 pandemic stalled digital transformations, according to a report published by …

magnify
Vulnerable TCP/IP stack is used by almost 200 device vendors

Researchers have discovered 14 new vulnerabilities affecting the proprietary NicheStack (aka InterNiche) TCP/IP stack, used in OT devices such as the extremely popular Siemens …

Office 365
A clever phishing campaign is targeting Office 365 users

Microsoft is warning about an ongoing, “sneakier than usual” phishing campaign aimed at Office 365 users. An active phishing campaign is using a crafty combination …

Don't miss

Cybersecurity news