![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100625/devsecops-400x200.jpg)
Only 8% of orgs have effective DevSecOps practices
92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so – a staggering capability gap exposed in …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105950/artificial_intelligence-400x200.jpg)
Most IT decision makers believe AI is the silver bullet to cybersecurity challenges
New research from ESET reveals that three in four IT decision makers (75%) believe that AI and ML are the silver bullet to solving their cybersecurity challenges. In the past …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100900/key-400x200.jpg)
Hashcat developer discovers simpler way to crack WPA2 wireless passwords
While looking for ways to attack the new WPA3 security standard, Hashcat developer Jens “Atom” Steube found a simpler way to capture and crack access credentials …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101011/bitcoin-400x200.jpeg)
Theft of user accounts on cryptocurrency exchanges is soaring
Within a year, the number of data leaks from cryptocurrency exchanges soared by 369%, Group-IB researchers have found, and the US, Russia and China are the countries where …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Android Pie: Security and privacy changes
It is official: “Android P” is Android Pie, and it comes with a variety of new capabilities and security and privacy changes. The newest version (9.0) of the …
![employee](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101041/employee-400x200.jpeg)
Cyber hygiene training is infrequent and inconsistent
Finn Partners Research released findings from its Cybersecurity at Work study that examined the level of cyber risk that employees pose to their organizations. The in-depth …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110041/bot-400x200.jpg)
Researchers open source tools to identify Twitter bots at scale
Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110221/iot-1-400x200.jpg)
The FBI warns about compromised IoT devices
The FBI is instructing users on how to recognize when their IoT devices have been compromised and advising them on how to keep them secure. “Compromised devices may be …
![HP](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194736/hp-400x200.jpg)
HP plugs critical RCE flaws in InkJet printers
HP has plugged two critical vulnerabilities (CVE-2018-5924, CVE-2018-5925) affecting many of its InkJet printers and is urging users to implement the provided firmware updates …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113120/gears-400x200.jpg)
Week in review: Deploying automation securely, dark web activities that indicate a breach
Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …
![Monero](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102212/monero-400x200.jpg)
Compromised MikroTik routers power extensive cryptojacking campaign
A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Cybercrime gangs continue to go where the money is
According to the APWG’s new Phishing Activity Trends Report, phishing in the first part of 2018 surged 46 percent higher than late 2017. The total number of phish detected in …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage