![Binance](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101646/binance-400x200.jpg)
Binance offers $250,000 for info about hackers who targeted its users
Binance, the popular Chinese cryptocurrency exchange focusing on crypto-to-crypto trading, has put a $250,000 bounty on the heads of the attackers who tried to pull off a …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105859/world-1-400x200.jpg)
Global SOC maturity improves, yet some still operate with serious gaps in security
Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102804/hands-400x200.jpg)
Organizations are not doing enough to protect data privacy
In today’s data-driven society, privacy, security and trust are more vital and intertwined than ever before. But many organisations are not doing all they can to protect data …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114037/mobile_devices4-400x200.jpg)
Week in review: New LTE attacks, Android P security, backdooring connected cars
Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be …
![robot IOActive](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103348/robot-ioactive-400x200.jpg)
Robots hijacked by ransomware may soon become a reality
How soon will we see our home, office or industrial robots being hijacked and held ransom by attackers? If they dedicate their efforts to research, that day may come sooner …
![World target](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110934/world-target-400x200.jpg)
Vulnerable Apache Solr, Redis, Windows servers hit with cryptominers
Vulnerable servers of all kinds are being targeted, compromised and made to mine cryptocurrencies for the attackers. Apache Solr servers under attack SANS ISC handler Renato …
![StreamSets Control Hub](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101657/StreamSets-Control_Hub-400x200.jpg)
New infosec products of the week: March 9, 2018
Discover, secure and govern personal data in motion StreamSets Data Protector reduces risk of violations by helping companies meet requirements for GDPR, HIPAA and other …
![Skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103817/skull-ascii-400x200.jpg)
Not all who pay a ransom successfully recover their compromised data
A new report by the CyberEdge Group found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016. How victims …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Cisco fixes critical flaw in its Secure Access Control System
Cisco has pushed out fixes for security vulnerabilities in a wide variety of its products, including two critical flaws in its Secure Access Control System (ACS) and its Prime …
![Android P](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101700/android-p-400x200.jpg)
Android P: Expected security and privacy improvements
Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of …
![UK](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101702/uk-400x200.jpg)
UK govt wants IoT manufacturers to take responsability for security
The UK government aims to shift the burden of securing IoT devices away from consumers and put the onus of securing them squarely on the manufacturers. “Poorly secured …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
Cloud access management is integral to adopting cloud applications
The proliferation of cloud applications and use of a disparate range of devices within businesses has led to 64% of IT leaders admitting that their security teams are …
Featured news
Resources
Don't miss
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently