![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
2017 was extraordinary: 5,200 breaches exposed 7.8 billion records
Once again, the record has been broken for both the most breaches and the most data compromised in a year. There were 5,207 breaches recorded last year, surpassing 2015’s …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101915/person-400x200.jpg)
Identity fraud enters a new era of complexity
The number of identity fraud victims increased by eight percent (rising to 16.7 million U.S. consumers) in the last year, a record high since Javelin Strategy & Research …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104532/people-400x200.jpeg)
Why developing an internal cybersecurity culture is essential for organizations
ENISA published a report providing organisations with practical tools and guidance to develop and maintain an internal cybersecurity culture. Understanding the dynamics of …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Cloud service adoption creates new data center demands
Both consumer and business applications are contributing to the growing dominance of cloud services over the Internet, according to the Cisco Global Cloud Index (2016-2021). …
![reddit bad](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101919/reddit-bad-400x200.jpg)
Realistic, well-positioned Reddit clone is out to grab users’ login credentials
A convincing clone of the popular social news aggregation and discussion site Reddit has been spotted on the reddit.co domain. The author is obviously counting on users not to …
![Grammarly](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101924/grammarly-400x200.jpg)
Flaw in Grammarly’s extensions opened user accounts to compromise
A vulnerability in the Grammarly Chrome and Firefox extensions allowed websites to read users’ authentication tokes and use to them to log in to the users’ …
![Cisco ASA 5500-X](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101927/cisco-ASA-5500-X-400x200.jpg)
Cisco issues new, complete fixes for critical flaw in enterprise security appliances
Cisco researchers have identified additional attack vectors and features that are affected by the “perfect 10” remote code execution and denial of service …
![technology](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105415/technology-400x200.jpg)
Data and analytics maturity: Most organizations should be doing better
91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
8 trends in government tech for an enterprise-focused approach to IT
Deloitte examined emerging trends in government technology, and highlighted eight trends that are shaping strategic and operational transformations and redefining IT’s …
![MacUpdate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101929/macupdate-400x200.jpg)
Mac crypto miner distributed via MacUpdate, other software download sites
Software download site/aggregator MacUpdate has been spotted delivering a new Mac crypto miner to users. A new Mac cryptominer was being distributed from hacked MacUpdate …
![Europol](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110453/europol-400x200.jpg)
Investigation uncovers Luminosity Link RAT distributors, victims are in the thousands
A hacking tool allowing cybercriminals to remotely gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers …
![Adobe Flash](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112448/adobe_flash-1-400x200.jpg)
About the Flash zero-day currently exploited in the wild
The zero-day Flash Player vulnerability (CVE-2018-4878) that Adobe warned about on Thursday was leveraged by North Korean hackers. FireEye calls the group TEMP.Reaper and …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022