Cloud compromise now the biggest cybersecurity issue for financial institutions
Infoblox unveils a research into how the COVID-19 shutdowns challenged the financial services industry’s core infrastructure. More than one year into the pandemic, …
Phishers using Zix to “legitimize” emails in the eyes of Office 365 users
UPDATE: May 19, 2021 – 03:10 AM ET Mirko Zorz, Editor in Chief, Help Net Security The page you are on used to contain a news item based on research from Abnormal …
May 2021 Patch Tuesday: Adobe fixes exploited Reader 0-day, Microsoft patches 55 holes
On this May 2021 Patch Tuesday: Adobe has fixed a Reader flaw exploited in attacks in the wild, as well as delivered security updates for eleven other products, including …
What the pipeline attack means for critical infrastructures
The big news in critical infrastructure security is the ransomware-triggered shutdown of the Colonial gasoline pipeline – the largest such pipeline in the USA. The …
Navigating the waters of maritime cybersecurity
In January 2021, new International Maritime Organization (IMO) guidelines on maritime cyber risk management went into effect. Around the same time, the U.S. government …
Scammers aren’t always who we expect them to be: How AI and biometrics can help
When it’s time to hire a new employee, organizations go to great lengths to avoid hiring someone who would commit fraud: background checks, credit checks, drug tests, etc. But …
When the adversarial view of the attack surface is missing, DX becomes riskier
Digital transformation (DX) has become a competitive imperative in most industries. Organizations that fail to make this shift successfully – or in a timely fashion …
Review: The Pentester Blueprint: Starting a Career as an Ethical Hacker
Brough to you by cybersecurity researcher Kim Crawley and pentester and author Phillip L. Wylie, The Pentester Blueprint gives insights into the most common hurdles …
Technology sector records employment growth in April
The U.S. technology sector has now recorded employment growth in each of the past five months, according to analysis by CompTIA. Technology companies added 16,600 jobs in …
Security awareness training doesn’t solve human risk
Traditional employee risk mitigation efforts such as security awareness training and phishing simulations have a limited impact on improving employees’ real-world …
Webcast: Get a sneak peek inside the CISSP domains
Look into the Certified Information Systems Security Professional (CISSP) official training course and walk away with a grasp of the topics covered in the CISSP Common Body of …
Why threat hunting is obsolete without context
Cybersecurity is an undisputed concern within any industry – but how are organizations and businesses using the security data and information they collect to best ensure their …
Featured news
Resources
Don't miss
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks