![general virtual digital](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113219/general-virtual-400x200.jpg)
Week in review: Lure10 attack, DoublePulsar exploit proliferation
Here’s an overview of some of last week’s most interesting news and articles: BrickerBot bricked 2 million IoT devices, its author claims The author of BrickerBot, …
![World target](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110934/world-target-400x200.jpg)
IT service providers, many other orgs targeted in long-standing attack campaign
US-CERT has released an alert warning about a sophisticated attack campaign using multiple malware implants and targeting organizations in the IT, Energy, Healthcare and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112017/labyrinth-400x200.jpg)
Will fileless malware push the antivirus industry into oblivion?
The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. …
![smart hospitals, healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105723/smart-hospitals-400x200.jpg)
How to securely deploy medical devices within a healthcare facility
The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt patients forever. A surgical …
![talk speak speaker](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112802/talk-400x200.jpg)
Industry reactions to the Verizon 2017 Data Breach Investigations Report
Nearly 2,000 breaches were analyzed in this year’s Verizon 2017 Data Breach Investigations Report and more than 300 were espionage-related. Here are some of the comments Help …
![Samsung](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104511/samsung-400x200.jpeg)
Employees increasingly allowed to move data onto personal mobile devices
Corporate data governance programs are difficult to establish and enforce. For the most part, these programs lack the necessary people, processes and technology to effectively …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111134/blueprint-400x200.jpg)
New infosec products of the week: April 28, 2017
Cyberbit EDR uses adaptive behavioral analysis to detect fileless, signature-less attacks Cyberbit announced a new version of its adaptive Endpoint Detection and Response …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111052/people-400x200.jpg)
IT teams struggle with digital transformation skills
New research conducted by Vanson Bourne aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future …
![Android unlocked](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111119/android-unlock-400x200.jpg)
How secure are mobile banking apps?
Do banking institutions have a good handle on the things they need to remediate and new control layers they need to adopt to keep users secure? To answer those questions, …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104506/spotlight-400x200.jpeg)
Executive spotlight: iovation’s new Vice President of Product
Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104509/architecture-400x200.jpeg)
Cybercrime can come in any shape or size, and not always the form you’d expect
Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Modern threat landscape: Seismic shifts in motivation and focus
Cybercriminals revealed new levels of ambition in 2016 – a year marked by extraordinary attacks, including multi-million dollar virtual bank heists and overt attempts to …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform