Help Net Security
The global nature of advanced cyber attacks
FireEye released a report that provides insight into the global nature of malware communication activity related to sophisticated cyber attacks. “The threat landscape …
Is your company ready for a big data breach?
Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …
Analysis of 5 million scans on 53 million hosts
Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …
File protection in the cloud with DigitalQuick
Fasoo announced that its new data security solution, DigitalQuick, which allows consumers to keep sensitive information private when shared via email or through cloud storage …
Remote users expose companies to cybercrime
Results of new remote access security research show half of companies with a remote workforce had their websites compromised in 2012, over a third had passwords hacked, and …
Free Android mobile security app
Android is an increasingly popular target for malware and SMiShing (SMS phishing). To help combat this growing threat, Sophos has introduced the latest version of its free …
Data thieves and their motives
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …
Wireless hack attacks target critical infrastructure
Critical infrastructure control systems are at risk from wireless attacks carried out over Software Defined Radio (SDR), according to Digital Assurance. Critical network …
Dangerous CSRF attacks up 132%
FireHost has announced today its Q1 2013 web application attack statistics, detailing the type and number of the most dangerous cyberattacks blocked by the firewalls that …
The importance of crowd-sourced threat intelligence
Imperva analyzed real-world attack traffic against 60 web applications between January and March 2013 to identify common attack patterns. Businesses can reduce the risk of …
SafeNet releases first crypto hypervisor
At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …
ForeScout and FireEye team for APT mitigation
ForeScout and FireEye announced an integrated approach to dynamically mitigate APTs and zero-day attacks. According to FireEye’s 2H2012 Advanced Threat Report, on …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)