Help Net Security

Are businesses prepared for a surge in cybercrime and fraud?
With the coronavirus economic crisis deepening, experts at University of Portsmouth are warning it will lead to the highest levels of fraud and cybercrime ever recorded. There …

What is the impact of AI and ML tools on cybersecurity?
89% of IT professionals believe their company could be doing more to defend against cyberattacks, with 64% admitting they are not sure what AI/ML means – despite increased …

Odix is disarming the growing malware threat
So far, 2020 has been a rough year for everyone not just for the cybersecurity space. Various threats and vulnerabilities have already led to cyberattack incidents during the …

CISOs: Quantifying cybersecurity for the board of directors
Only 9% of security teams feel as if they are highly effective in communicating security risks to the board and to other C-suite executives, according to a recent survey …

Top threat detection trends and challenges for cybersecurity professionals
User networks and endpoints are the biggest concerns for 65% of respondents, an 11% increase from last year, Attivo Networks reveals. Exploring the top threat detection trends …

46% of SMBs have been targeted by ransomware, 73% have paid the ransom
Ransomware attacks are not at all unusual in the SMB community, as 46% of these businesses have been victims. And 73% of those SMBs that have been the targets of ransomware …

COVID-19 affects web traffic and attack trends
There have been significant changes in web attack and traffic trends as a result of COVID-19, according to Imperva. The monthly report also revealed that the Cyber Threat …

How Hoxhunt minimizes cybersecurity risks from human error
Cybersecurity has become a top priority for most companies. Many businesses have already invested significantly in security software to mitigate attacks. Corporate tech …

Multi-cloud key management and BYOK
Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …

Understanding web security solutions
As should be evident to anyone in the cyber security industry, the wide range of available web security solutions from commercial vendors will necessarily have varying degrees …

Starbleed vulnerability: Attackers can gain control over FPGAs
Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …

Average bandwidth of DDoS attacks increasing, APIs and applications under attack
The volume and complexity of attacks continued to grow in the first quarter of 2020, according to Link11. There has been an increasing number of high-volume attacks in Q1 …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices