![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Europe and Russia home to half of credential theft victims worldwide
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111933/ddos-1-400x200.jpg)
DNS amplification attacks double in Q1 2018
DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard. …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104208/IoT-400x200.jpg)
IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104308/cloud-paper-400x200.jpg)
Compliance worries prevent greater cloud use
New research released by WinMagic shows that 87% of ITDMs limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter said, it meant as …
![Dixons Carphone](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100811/dixons_carphone-400x200.jpg)
Dixons Carphone breach: Personal and payment card info compromised
Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security …
![Windows 10 patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101654/windows_10-patch-400x200.jpg)
Overview: Microsoft June 2018 Patch Tuesday
It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101028/google_chrome2-400x200.jpg)
Google removes inline installation option for Chrome extensions
Google is shutting down an often used vector for delivering malicious Chrome extensions to users by removing the inline installation option. What will happen? The announcement …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100823/user-400x200.jpg)
Zero Trust Security: Never trust, always verify
Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. In this …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100825/money-400x200.jpg)
Has paying the ransom become business as usual?
Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of executives (53%) reported …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100814/server-400x200.jpg)
Cost of lagging DevOps and microservice enablement? $34 million per year
Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Banks planning further integration of regulatory data
Most global banks are planning to integrate their regulatory workflow data. But keeping up to date with the fast pace of regulatory change, as well as staying compliant with …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110517/usa-flag-400x200.jpg)
US repeals net neutrality rules, what happens now?
Net neutrality rules have been officially repealed in the US on Monday, as the Restoring Internet Freedom Order by the Federal Communications Commission went into effect. The …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)