Help Net Security
Big data moving to Kubernetes with speed, complexities arising
Pepperdata announced the results of a new survey to gauge the pace at which enterprises are migrating big data applications to Kubernetes containers. 600 senior enterprise IT …
Attackers bypass Microsoft patch to deliver Formbook malware
Sophos Labs researchers have detected the use of a novel exploit able to bypass a patch for a critical vulnerability (CVE-2021-40444) affecting the Microsoft Office file …
Ransomware Empire: Who might blackmail your company?
The history of ransomware attacks covers slightly over 30 years. Over this modest period, cybercriminals have been relentlessly building ransomware capacities and improving …
Open-source software holds the key to solving Log4Shell-like problems
Earlier this month, the existence of a critical vulnerability in Apache Log4j 2 was revealed and a PoC for it published. Dubbed Log4Shell, it’s an issue in a logging library …
What’s stopping consumers from using credit freezes?
A Identity Theft Resource Center and DIG.Works research explored the relationship between data breach notices and a decision for a consumer to freeze their credit, as well as …
How confident can organizations be in their managed services security?
MITRE Engenuity and Cybersecurity Insiders announced the results of a research about the state of affairs in managed services security. The survey of IT security professionals …
Valuing IT professionals to retain talent and reduce their stress
Keeping up with digital transformation (32%) and keeping talent in technical roles (26%) are the two biggest challenges organizations face today, an Ivanti survey of IT …
Cybercriminals shifting focus: IT sector most targeted in 2021
Darktrace reported that the IT and communications sector was globally the most targeted industry by cybercriminals in 2021. Darktrace’s data is developed by ‘early …
Why the updated OWASP Top 10 list can’t be addressed by WAF?
Did you know that OWASP published its updated Top 10 web vulnerabilities list? And that it includes updates that could impact the design and functionality of your WAF …
6 top cybersecurity trends from 2021 and their impact on 2022
2021 has been a wild year in the cybersecurity space. From supply chain attacks like the SolarWinds hack to the NSO Group’s spyware scandal to the Colonial Pipeline ransomware …
Cybersecurity budgets surge, as skills gap wreaks havoc on 2022 plans
As enterprises plan and set budgets for the new year ahead, the vast majority are expecting to channel more dollars toward enhancing their cybersecurity efforts. Organizations …
How familiar are consumers with data protection best practices?
With data breaches on the rise along with consumer demand for privacy and control over their own data, governments have in turn adopted new data protection regulations — and …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform