![StellarGraph](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/10092721/stellargraph-400x200.jpg)
Open source algorithms for network graph analysis help discover patterns in data
StellarGraph has launched a series of new algorithms for network graph analysis to help discover patterns in data, work with larger data sets and speed up performance while …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/05112959/password-code-400x200.jpg)
Week in review: Password psychology, SaltStack Salt vulnerabilities exploited, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and podcasts: SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP! …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102542/biohazard-400x200.jpg)
H2 2019: Duration of phishing attacks grows, use of banking trojans wanes
The lifespan of phishing attacks in H2 2019 has grown considerably and resulted in the tremendous increase in the number of phishing websites blockages, says Group-IB’s …
![GitHub Code Scanning](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/08094717/github_code_scanning-400x200.jpg)
GitHub Code Scanning aims to prevent vulnerabilities in open source software
GitHub has made available two new security features for open and private repositories: code scanning (as a GitHub-native experience) and secret scanning (both still in beta). …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
The new cyber risk reality of COVID-19 operating mode
There’s little, if any, precedent for the time we’re experiencing right now with a pandemic changing the corporate landscape in profound ways. But while many are reacting in …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/11111202/lock-400x200.jpg)
99% of enterprise users reuse passwords across accounts
Very few users take appropriate action to significantly reduce the risk of password compromise, according to a Balbix report. The study found that more than 99% of enterprise …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/05174135/shield-400x200.jpg)
How to increase cyber defense agility for the next lockdown
If this worldwide lockdown has taught us anything, it’s that we’re not nearly agile enough and we really need to prepare for future scenarios. Whether the next lockdown comes …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093217/DevOps-400x200.jpg)
Financial services leading the way in adopting DevOps, still hurdles remain
Businesses in financial services are ahead of the government sector in adopting DevOps to increase their speed of development and free up developer time, but hurdles still …
![credit card](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/06144547/credit_card_black-400x200.jpg)
Is the stress of card fraud worth the digital convenience?
With a growing portion of consumers having now fallen victim to card fraud, anxiety about the security of our digital accounts is spiking, according to a survey by Marqeta. …
![Magento](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100304/magento-400x200.jpg)
How a favicon delivered a web credit card skimmer to victims
Cyber crooks deploying web credit card skimmers on compromised Magento websites have a new trick up their sleeve: favicons that “turn” malicious when victims visit …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/09122407/firefox-logo-new-2-400x200.jpg)
Firefox 76 delivers new password security features and security fixes
Mozilla has released Firefox 76, which comes with critical security fixes and new features related to Firefox Lockwise, the browser’s password manager/generator …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
Passwords still widely used, despite known weaknesses
Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT …