![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102004/architecture-400x200.jpeg)
How do your IT complexity challenges compare to those of other CIOs?
A global survey of 800 CIOs conducted by Vanson Bourne reveals that 76% of organizations think IT complexity could soon make it impossible to manage digital performance …
![The Ransomware Survival Handbook](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09101957/ransomware-survival-handbook-400x200.jpg)
The Ransomware Survival Handbook
When a ransomware infection spreads through your network, its goal is to encrypt any files it can access (even backups) as quickly as possible. That can happen in a matter of …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Attackers disrupt business operations through stealthy crypto mining
WannaMine, a Monero-mining worm discovered last October, is increasingly wreaking havoc on corporate computers. Either by slowing down computers or by crashing systems and …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105943/firefox-independent-1200.5bd827ccf1ed-400x200.jpg)
Mozilla plugs critical and easily exploitable flaw in Firefox
Firefox users would do well to upgrade to the browser’s latest release if they want to keep their computers safe from compromise. Released on Monday, Firefox 58.0.1 …
![netflow patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102010/netflow-patch-400x200.jpg)
Multiple zero-day vulnerabilities found in ManageEngine products
Digital Defense uncovered multiple, previously undisclosed vulnerabilities within several Zoho ManageEngine products. ManageEngine offers more than 90 tools to help manage IT …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102016/email-1-400x200.jpg)
Most top US and EU e-retailers are putting their consumers at risk
A new study by 250ok has revealed that 87.6 percent of the root domains operated by top e-retailers in the United States and European Union are putting their brands and …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195642/binary-208216_1280-400x200.jpg)
Widespread API use heightens cybersecurity risks
A new Imperva survey showed a heightened concern for cybersecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Cisco plugs critical hole in many of its enterprise security appliances
There’s an eminently exploitable remote code execution flaw in the Adaptive Security Appliance (ASA) Software running on a number of Cisco enterprise appliances, and …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102012/hand_computer-400x200.jpeg)
How to prepare for the future of digital extortion
Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Dridex gang follows trends, also created FriedEx ransomware
The gang behind the infamous banking Trojan Dridex has also created the FriedEx (aka BitPaymer) ransomware, ESET researchers confidently claim. The similarities between Dridex …
UK critical operators risk £17m fines for poor cybersecurity practices
UK essential service operators risk fines of up to £17 million if they fail to implement robust protections against cyber attack. The penalties will apply to energy, …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103019/bitcoin-400x200.jpeg)
British cryptocurrency traders robbed of Bitcoin at gunpoint
Cryptocurrency heists are usually covert affairs that leave users with empty wallets, but not fearing for their life. Still, there are always some unlucky individuals who get …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022