![power](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101825/power-400x200.jpg)
Cryptomining malware continues to drain enterprise CPU power
Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global …
![meltdown](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102251/meltdown-400x200.jpg)
Microsoft boosts Windows Analytics to help squash Meltdown and Spectre bugs
A day after Microsoft announced it will be adding Windows Defender ATP down-level support for older OSes comes the news that its Windows Analytics service is getting new …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105855/telegram-danger-400x200.jpg)
How cybercriminals exploited Telegram flaw to deliver malware
A “vulnerability” in Telegram’s desktop instant messaging client for Windows was exploited for months by Russian cybercriminals to deliver malware to users. …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103155/patch-400x200.jpg)
Microsoft, Adobe February 2018 security updates: An overview
The Microsoft February 2018 security updates are for Internet Explorer, Edge, Windows, Office, Office Services and Web Apps, Adobe Flash, and ChakraCore (the core part of the …
![hourglass](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101837/hourglass1-400x200.jpg)
Here’s what keeps your CISO up at night
89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Financial services firms most adept at making balanced security investments
Cyber attacks cost financial services firms more to address and contain than in any other industry, and the rate of breaches in the industry has tripled over the past five …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
Hybrid data storage is growing rapidly in the digital workplace
82% of businesses are currently deploying a mix of cloud and on- premises infrastructure. Egnyte analyzed over 14 petabytes of data across thousands of businesses worldwide to …
![VERA](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194210/vera-400x200.jpg)
Canon selects Vera to secure the future of digital imaging and printing
Canon has selected Vera to secure and protect Canon’s fleet of digital imaging and printing products and services. This partnership will help enterprises protect their …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105803/android-1-400x200.jpg)
Millions of Android devices forced to mine Monero for crooks
No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing. With that in …
![Windows Defender](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101828/windows-defender-atp-400x200.png)
Microsoft to provide Windows Defender ATP for older OS versions
Microsoft will backport Windows Defender Advanced Threat Protection (ATP) to meet the security needs of organizations that have not yet entirely switched to Windows 10. …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111725/brain-400x200.jpg)
Most CIOs plan to deploy artificial Iintelligence
Meaningful artificial intelligence (AI) deployments are just beginning to take place. Gartner’s 2018 CIO Agenda Survey shows that four percent of CIOs have implemented AI, …
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101832/dislike-400x200.jpg)
German court says Facebook use of personal data is illegal
Facebook’s default privacy settings and some of its terms of service fall afoul of the German Federal Data Protection Act, the Berlin Regional Court has found. By not …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022