![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Researchers discover next generation phishing kit
Researchers at Check Point and CyberInt, have discovered a new generation of phishing kit that is readily available on the Dark Web. A posting on the Dark Net that advertises …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101232/apple-devices-400x200.jpg)
Apple device users, stay away from QR codes until you upgrade
It’s time to update your Mac and iOS-powered devices again: Apple has plugged four vulnerabilities, two of which could be exploited to execute arbitrary code if a user …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Cyber risk assessment and disclosure requirements: What’s important to you?
In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …
![insider](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101239/insider-400x200.jpeg)
$8.76 million: The average yearly cost of insider threats
According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organizations,” the average cost of an insider threat annually is $8.76 million. It’s …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103418/question-400x200.jpg)
Are your organization’s key assets at risk?
A new study conducted by the Ponemon Institute shows increases in threats and awareness of threats to knowledge assets, as well as improvements in addressing those threats by …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
SOCs require automation to avoid analyst fatigue for emerging threats
A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110650/danger-400x200.jpg)
Not all malware is created equal
Lastline’s Q4 2017 Malscape Monitor Report delivers previously unavailable trends and actionable insights into malicious behaviors and how threats unfold. The MIME types …
![wallet](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102045/wallet-400x200.jpg)
Exfiltrating private keys from air-gapped cold wallets
Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security …
![Absolute](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104907/absolute-persistence-400x200.jpg)
Solving the dark endpoint problem with increased visibility and control
In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110221/iot-1-400x200.jpg)
Effective intrusion detection for the Internet of Things
A group of researchers have devised a self-learning system for detecting compromised IoT devices that does not require prior knowledge about device types or labeled training …
![Alert](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101242/alert-pills-400x200.jpg)
Orangeworm hackers target healthcare corporations
A hacking group dubbed Orangeworm has been targeting, either directly or indirectly, international corporations operating within the healthcare sector, Symantec researchers …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101244/market-400x200.jpg)
Largest inhibitor of cyber insurance market growth? Silent cyber risk
A new study of the UK cyber risk insurance and broker community reveals startling findings. First and foremost, the insurance industry needs to address non-affirmative cyber …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)