Help Net Security

How can businesses realize the true value of digital transformation?
Although 94% of ITDMs agree that the speed of digital transformation (DX) has accelerated over the last year, decision makers outside of IT departments fail to recognise the …

150+ HP multifunction printers open to attack (CVE-2021-39237, CVE-2021-39238)
Over 150 HP multifunction printers (MFPs) are open to attack via two exposed physical access port vulnerabilities (CVE-2021-39237) and two different font parsing …

Massive online crime crackdown leads to 1,000 arrests
An operation coordinated by INTERPOL codenamed HAECHI-II saw police arrest more than 1,000 individuals and intercept a total of nearly $27 million of illicit funds, …

How to combat ransomware with visibility
In the first half of 2021, average ransomware demands surged by 518%, while payments climbed by 82%. There has been a growing number of attacks in healthcare, with 560 …

Implications of strengthening the cybersecurity of small business in America
On November 2, 2021, the House of Representatives passed two bills with the goal of strengthening the cybersecurity of small businesses in America. The first bill, the Small …

Most challenging security threats for CTOs
59% of CTOs still see human error as the main security threat to their business, alongside other prominent concerns such as ransomware (49%) and phishing (36%), a research …

Ecommerce retailers facing a 350% increase in fraudulent online orders
As the holiday shopping season hits full stride, ecommerce retailers across Europe face a new era of malicious attacks spurred by a COVID-inspired transformation in ecommerce …

Patching takes 2.5 times longer when endpoints are remote
Action1 released a report based on the feedback from 491 IT professionals worldwide. The study explores how organizations patch and manage their remote and office-based …

Secure cloud products and services with new CIS Benchmarks
The cloud continues to expand with new products and services constantly introduced by cloud service providers (CSPs). The Center for Internet Security (CIS) responded with …

Big salaries alone are not enough to hire good cybersecurity talent: What else can companies do?
Amid the severe and ongoing cyber skills shortages, both cybersecurity firms and in-house IT and cybersecurity departments are struggling to hire enough talented and qualified …

Behavioral biometrics: A promising tool for enhancing public safety
While globalization has enabled easy cross-border movement and transactions, fraudulent activities have, unfortunately, followed suit. The growing demand for a multi-layered …

Addressing the cybersecurity skills gap with higher education
Although the field of cybersecurity has expanded exponentially over the past decade, the fact that the workforce in the field has not increased adequately has now become …
Featured news
Resources
Don't miss
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late
- AI voice hijacking: How well can you trust your ears?
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns