Help Net Security

H2 2019: Duration of phishing attacks grows, use of banking trojans wanes
The lifespan of phishing attacks in H2 2019 has grown considerably and resulted in the tremendous increase in the number of phishing websites blockages, says Group-IB’s …

May 2020 Patch Tuesday forecast: Time for a break?
It’s been a hectic month for everyone worldwide, but we may get a small break in the action this patch Tuesday. The forecast for May is looking light on updates, which will be …

The new cyber risk reality of COVID-19 operating mode
There’s little, if any, precedent for the time we’re experiencing right now with a pandemic changing the corporate landscape in profound ways. But while many are reacting in …

99% of enterprise users reuse passwords across accounts
Very few users take appropriate action to significantly reduce the risk of password compromise, according to a Balbix report. The study found that more than 99% of enterprise …

Financial services leading the way in adopting DevOps, still hurdles remain
Businesses in financial services are ahead of the government sector in adopting DevOps to increase their speed of development and free up developer time, but hurdles still …

Is the stress of card fraud worth the digital convenience?
With a growing portion of consumers having now fallen victim to card fraud, anxiety about the security of our digital accounts is spiking, according to a survey by Marqeta. …

Passwords still widely used, despite known weaknesses
Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT …

Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19
Close your eyes and imagine an optimum state of happiness. People may envision different things — a beach, a hike through the woods, a family meal — but most cybersecurity …

Shifts in device usage have large security implications
There have been rapid substantial changes in device usage trends, and the connected security implications, as businesses shifted their operations in March due to COVID-19, …

Most attacks successfully infiltrate production environments without detection
While organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of …

Software vulnerabilities sometimes first announced on social media
Software vulnerabilities are more likely to be discussed on social media before they’re revealed on a government reporting site, a practice that could pose a national …

Worldwide IT spending expected to decline 5.1% in 2020
Worldwide IT spending is now expected to decline 5.1% in constant currency terms during 2020 to $2.25 trillion, as the economic impact of the COVID-19 pandemic continues to …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems