![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
Netflix, Dropbox promise not to sue security researchers, with caveats
Netflix and Dropbox have both noted recently that they won’t sue security researchers who find and disclose vulnerabilities in their products. The only caveat is: the …
![Atlanta](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101539/atlanta-biohazard-400x200.jpg)
Atlanta government systems hit by ransomware
The city of Atlanta has suffered a ransomware attack on Thursday, which resulted in outages of some of its customer facing applications, including some that customers may use …
![RSAC](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101542/rsac-crowd2-400x200.jpg)
RSA Conference 2018 USA: What you can expect at this year’s event
With RSA Conference 2018 USA less than a month away, we asked Britta Glade, Director, Content and Curation for RSA Conference, to tell us more about this year’s event. …
![Gemalto ID card](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101551/gemalto_id_card-400x200.jpg)
New infosec products of the week: March 23, 2018
Gemalto unveils enhanced security features for ID documents These security features are available as additional options in the Gemalto Color Laser Shield secure identity …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
1 in 10 targeted attack groups use malware designed to disrupt
Cyber criminals are rapidly adding cryptojacking to their arsenal and creating a highly profitable new revenue stream, as the ransomware market becomes overpriced and …
![axe](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101548/axe-400x200.jpg)
Top cybersecurity evasion and exfiltration techniques used by attackers
SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders. During the past …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Malware leverages web injects to empty users’ cryptocurrency accounts
Criminals trying to get their hands on victims’ cryptocurrency stashes are trying out various approaches. The latest one includes equipping malware with …
![Android apps](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104618/android-apps-400x200.jpg)
Malicious apps in app stores decrease 37 percent
Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Flaws in ManageEngine apps opens enterprise systems to compromise
Researchers have discovered multiple severe vulnerabilities in ManageEngine’s line of tools for internal IT support teams, which are used by over half of Fortune 500 …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
Excessive alerts, outdated metrics, lead to over-taxed security operations centers
A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Global WAN survey highlights the importance of network simplification
Cato Networks, provider of the global SD-WAN as a service Cato Cloud, released the findings of its enterprise WAN market study. The report, “State of WAN 2018: Too Complex to …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
Worldwide IoT security spending to reach $1.5 billion in 2018
IoT-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 percent of organizations observed at least one IoT-based attack in the past …
Featured news
Resources
Don't miss
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently
- It’s time to secure the extended digital supply chain