![dollar](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112427/dollar-400x200.jpg)
The ransomware attack cost Norsk Hydro $40 million so far
A little over a week after the beginning of the ransomware attack targeting Norsk Hydro, the company has estimated that the costs it incurred because of it have reached …
![ASUS](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194212/asus-400x200.jpg)
ASUS confirms server compromise, releases fixed Live Update tool
ASUS has finally confirmed that its servers were compromised and that its ASUS Live Update tool has been tampered with, as revealed on Monday. “ASUS has also implemented …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113558/stop-1-400x200.jpg)
Build-time security: Block risk and security issues from production rings
Build-time security has become a standard part of any security program and continues to grow in popularity with the shift left movement. In its most popular form, it’s a …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Weighing the options: The role of cyber insurance in ransomware attacks
The Norsk Hydro cyberattack is a real-time case study of what an international company goes through when a ransomware attack is successful. Over the last week, we’ve witnessed …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100025/alert-400x200.jpg)
Encrypted attacks growing steadily, cybercriminals are increasingly targeting non-standard ports
In 2018, SonicWall recorded the decline of cryptojacking, but more ransomware, highly targeted phishing, web application attacks and encrypted attacks. The company’s …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
New blockchain system uses reputation to fend off 51 percent attacks
A blockchain system has been proposed to guarantee proper performance even when more than 51% of the system’s computing power is controlled by an attacker. The system, …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094843/person-400x200.jpg)
61% of CIOs believe employees leak data maliciously
There is a perception gap between IT leaders and employees over the likelihood of insider breaches. It is a major challenge for businesses: insider data breaches are viewed as …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104811/data-400x200.jpg)
Does siloed data negatively impact your organization?
Many companies are struggling to make data accessible and get value from it, with 68 percent of respondents reporting siloed data negatively impacts their organization, …
![HITBSecConf](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195015/hitbsecconf-400x200.png)
What you can expect at the 10th annual HITB Security Conference in The Netherlands
The tenth edition of Hack In The Box Amsterdam will soon be upon us, with interesting talks, trainings, and hacking contests. Some of the trainings have already been sold out, …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101001/apple-400x200.jpg)
Apple fixed some interesting bugs in iOS and macOS
In addition to announcing a number of new products and subscription services, Apple has released security updates for iOS, macOS, Safari, tvOS, iTunes, iCloud, and Xcode. The …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
How to build an effective vulnerability management program
The concept of vulnerability management has undergone a number of changes in the last few years. It is no longer simply a synonym for vulnerability assessment, but has grown …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094754/keys-400x200.jpg)
Cybercriminals are increasingly using encryption to conceal and launch attacks
In this Help Net Security podcast, Deepen Desai, VP Security Research & Operations at Zscaler, talks about the latest Zscaler Cloud Security Insight Report, which focuses …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations