![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience
Here’s an overview of some of last week’s most interesting news and articles: Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution A …
![cloud proliferation](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103948/clouds-400x200.jpg)
Vulnerable cloud infrastructure experiencing increasing attacks
Attackers are increasingly targeting vulnerable cloud infrastructure to exploit it for covert cryptojacking or to deliver ransomware, Securonix researchers warn. Some attacks …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Researcher warns of privilege escalation flaw in Check Point ZoneAlarm
Illumant researcher Chris Anastasio has discovered a serious vulnerability in Check Point’s security software. It affects ZoneAlarm Free Firewall and ZoneAlarm Free Antivirus …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
GDPR-ready organizations see lowest incidence of data breaches
Organizations worldwide that invested in maturing their data privacy practices are now realizing tangible business benefits from these investments, according to Cisco’s …
![research](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110743/research-400x200.jpg)
New infosec products of the week: January 25, 2019
Threat Stack announces new API for streamlined DevOps and security workflows The new API will allow for the suppression and dismissal of alerts from existing tools, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101419/danger-400x200.jpg)
83% of global respondents experienced phishing attacks in 2018
Proofpoint analyzed data from tens of millions of simulated phishing attacks sent over a one-year period, along with nearly 15,000 cybersecurity professional survey responses, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
The most effective security strategies to guard sensitive information
Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101159/arrows-400x200.jpg)
Enterprises turn to MSPs to mitigate huge skills gap concerns
A huge skills gap coupled with security worries is driving IT decision makers to engage Managed Service Providers (MSPs) to handle their IT needs, according to NTT Com. Of the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095734/danger-400x200.jpg)
PHP PEAR supply chain attack: Backdoor added to installer
Some additional details have emerged about the recent security breach involving the PHP PEAR (PHP Extension and Application Repository) webserver, but much is still unknown. …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110832/cisco-400x200.jpg)
Cisco fixes security holes in SD-WAN, Webex, Small Business routers
Cisco has fixed a heap of security holes in a variety of its products, including a critical one affecting its SD-WAN Solution. Cisco SD-WAN vulnerabilities The most critical …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100835/servers-400x200.jpg)
Organizations waste money storing useless IT hardware
A survey of 600 data center experts from APAC, Europe and North America reveals that two in five organizations that store their data in-house spend more than $100,000 storing …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095805/connection-400x200.jpg)
Branching out more efficiently and securely with SD-WAN
As enterprises expand, through organic growth or acquisition, they need to support the IT needs of more distributed locations. These often include teams in shared office …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage