Help Net Security
Attackers use reflection techniques for larger DDoS attacks
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification …
Dangerous spam targets Brits with fake Easter offers
Cybercriminals are hiding dangerous goodies among the Easter eggs and chocolate bunnies that Brits are hoping for this Easter. A large amount of religious scams have also been …
Security pros and government failing to collaborate
Infosecurity Europe has today released a new report that provides a snapshot of the industry landscape and the challenges it is currently facing. Having surveyed 1,149 …
SharePoint users are breaching security policies
A study, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas, has found that at least 36% of SharePoint users are breaching …
Microsoft releases Threat Modeling Tool 2014
The Microsoft Threat Modeling Tool 2014 is the latest version of the free Security Development Lifecycle Threat Modeling Tool that was previously released back in 2011. …
Security pros actively hiding negative facts from executives
A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff. In nearly 60 percent of the …
ModSecurity 2.8.0 released
ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. It can also monitor the HTTP traffic in real time in order to …
Heartbleed threatens mobile users
As time passes, it becomes more and more obvious that almost no-one is safe from the danger created by the existence of the OpenSSL Heartbleed bug. In the days after the …
The security of the most popular programming languages
A new WhiteHat Security report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more. …
Heartbleed should jumpstart important security changes
With impacts on an estimated 60-70% of websites, Heartbleed is easily the security vulnerability with the highest degree of potential impact ever. There’s lots of good …
Half of IT pros make undocumented changes to IT systems
57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …
Businesses take little action to mitigate the insider threat
While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations