![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Hackers go phishing for the holidays
It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to be …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
CISOs are skeptical about claims made by cybersecurity vendors
There is a high level of skepticism about claims due to vague product descriptions, ambiguous statistics, limited ability to measure product effectiveness, and a general lack …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Worst passwords of 2019: Are you using one of them?
SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most commonly leaked passwords. In an interesting turn of …
![hunt](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103025/soldier-400x200.jpg)
What is the actual role of a threat hunter?
The role and tasks of a threat hunter are confusing, according to a ThreatQuotient and SANS study based on data collected from 575 participating companies that either work …
![Cynerio](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/17104817/cynerio-book-400x200.jpg)
Download: The Risk Mitigation Handbook for Connected Medical Devices
Wondering what it takes to secure clinical networks in your healthcare organization? Get The Risk Mitigation Handbook for Connected Medical Devices, a practical approach to …
![Google](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194147/google-400x200.png)
How Google applies Europe’s Right to Be Forgotten
Five years ago, after a landmark ruling of the Court of Justice of the European Union, Google began receiving, evaluating and acting upon requests to delist certain URLs …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Things to keep in mind when raising capital for your cybersecurity venture
Long-term business success is rarely (if ever) a result of stumbling into opportunities and making makeshift decisions. In cybersecurity, as in any other industry, one might …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103906/lock-400x200.jpg)
The holiday season: A cybercriminal’s winter wonderland
It’s the most wonderful time of the year – for cybercriminals that is. With increased online sales, major commercial holidays like Black Friday and Cyber Monday present …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Hacking and malware cause 75% of all data breaches in the financial services industry
Only 6% of all breaches in 2019 were suffered by financial services firms, according to Bitglass. However, these breaches compromised significantly more records than those …
![wireless](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101648/wireless1-400x200.jpg)
Major vulnerabilities found in popular wireless presentation system
F-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105947/architecture-400x200.jpg)
Top enterprise analytics trends for 2020
The top 10 enterprise analytics trends to watch in 2020 have been announced by MicroStrategy in collaboration with analysts and influencers from Forrester, IDC, Constellation …
![Windows 7](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094455/windows7-400x200.jpg)
Windows 7 is reaching end-of-extended-support, what to do?
Windows 7, released in October 2009, was one of Microsoft’s big successes. Ten years later and despite its end-of-extended-support deadline being imminent (January 14, …
Featured news
Sponsored
Don't miss
- Review: Action1 – Simple and powerful patch management
- Securing remote access to mission-critical OT assets
- Coding practices: The role of secure programming languages
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)