Help Net Security
Mobile phishing exposure in the energy industry surged 161% in 2021
Mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021, a Lookout report reveals. The research indicates …
Younger generations care little about cybersecurity
SailPoint released a survey which aimed to identify gaps within organizations’ cybersecurity postures by analyzing workforce behaviors that blur work and personal lives, …
Security teams need to become more proactive and risk-driven
83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other …
Week in review: CVE + MITRE ATT&CK methodology, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 70 released (IN)SECURE Magazine is a free …
Software development: Why security and constant vigilance are everyone’s responsibilities
An report from May 2021 has found that 81% of developers admit to knowingly releasing vulnerable apps, and 76% experienced pressure to sacrifice mobile security for …
77% of rootkits are used for espionage purposes
In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or …
Organizations seldom prioritize cybersecurity over business outcomes
55% of large companies are not effectively stopping cyberattacks, finding and fixing breaches quickly, or reducing the impact of breaches, according to a research study from …
Fragmented approach to identity security management creates risk
One Identity released global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity sprawl – has …
Blocked DDoS events up 75% in the first nine months of 2021
Radware has published results from its report which provides an overview of the DDoS attack landscape, application attack developments, and unsolicited network scanning …
Lean security: How small cybersecurity teams perform at Fortune 2000 levels
There’s a widespread misconception that small IT security teams, or “lean sec teams”, cannot protect their organizations as comprehensively as bigger security teams who enjoy …
How to ease password pains while maintaining security
As much as any industry, healthcare must deal with a security landscape that is fraught with challenges and tensions. Health delivery organizations (HDOs) operate under …
Top 10 ways attackers are increasing pressure on their ransomware victims to pay
Sophos researchers have detailed how ransomware attackers are implementing a wide range of ruthless pressure tactics to persuade victims to pay the ransom. Their research is …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform