![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104734/windows-400x200.jpg)
Bugs in Windows DNS client open millions of users to attack
In this month’s Patch Tuesday, Microsoft has included fixes for multiple critical memory corruption vulnerabilities in the Windows DNS client, which could be exploited …
![Accenture](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102934/accenture-400x200.jpg)
Accenture inadvertently exposes highly sensitive corporate, client data online
Corporate consulting giant Accenture left bucketloads of sensitive corporate and client data exposed online for anyone to access. Luckily for them, it seems that UpGuard …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111449/earthspace-400x200.jpg)
Inside the Middle Eastern and North African cybercriminal underground
Trend Micro researchers investigated the Middle Eastern and North African cybercriminal underground, and found that prices for malware and hacking tools are generally a bit …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104938/biohazard-400x200.jpg)
Defense contractors, manufacturers targeted with malware-as-a-service infostealer
Information stealing FormBook malware is being lobbed at defense contractors, manufacturers and firms in the aerospace sector in the US and South Korea. Delivery methods The …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113757/business-400x200.jpg)
Do board members treat cybersecurity as a top priority?
Despite high profile cyberattacks continuing to occur, almost half of IT decision makers (ITDMs) at 250+ employee organizations around the world still believe that business …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102945/question-400x200.jpg)
Alleged cyberstalker unmasked by VPN logs
A Massachusetts man was arrested on cyberstalking charges after the online activities he tried to hide through VPN use were revealed by logs provided by PureVPN. “It is …
![bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103735/bitcoin-400x200.jpg)
Hackers use organizations’ resources for stealthy cryptocurrency mining
Hackers lusting after cryptocurrency but not wanting to spend money to buy it or mine it are targeting users wallets, computers, popular Web sites and public cloud computing …
![PC](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104657/pc-400x200.jpg)
Patching discrepancy between supported Windows versions puts users at risk
Security improvements should be a welcome addition to all software, but if they are not also simultaneously backported into its older and still supported versions, they can …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
Disqus, Forrester Research suffer data breach
Popular blog comment hosting service Disqus and market research company Forrester Research announced late on Friday that they’ve suffered a breach. While the latter was …
![cloud threats](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113927/cloud-threats-400x200.jpg)
Cloud IT infrastructure revenue has almost tripled in the last four years
Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 25.8% year over year in the …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
Week in review: Email tracking, DNS exfiltration, and secure coding in Java
Here’s an overview of some of last week’s most interesting news and articles: Leaving employees to manage their own password security is a mistake Despite the …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
Leaving employees to manage their own password security is a mistake
Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage