Help Net Security

Exploitation of IoT devices and Windows SMB attacks continue to escalate
Cybercriminals upped the intensity of IoT and SMB-related attacks in the first half of 2019, according to a new F-Secure report. The report underscores the threats IoT devices …

Only one quarter of retail banks have adopted an integrated approach to financial crime systems
Most banks plan to integrate their fraud and financial crime compliance systems and activities in response to new criminal threats and punishing fines, with the U.K. leading …

Cyber Battle of the Emirates: Training the next generation of cyber security pros
Held annually in Asia, Europe and the Middle East, Hack In The Box conferences bring together the world’s top cyber security experts to share and discuss their latest …

Week in review: Simjacker attacks, critical Exim flaw, Sandboxie becomes freeware
Here’s an overview of some of last week’s most interesting news, interviews and articles: More than a year after GDPR implementation, half of UK businesses are not …

The rise of modern applications, DevSecOps and the intelligence economy
There has been a significant year-over-year growth in enterprise usage trends around multi-cloud adoption, open source technologies such as Kubernetes, and AWS cloud-native …

Security leaders lack confidence in the supply chain, fear third-party attacks
An overwhelming number of cybersecurity professionals (89%) have expressed concerns about the third-party managed service providers (MSPs) they partner with being hacked, …

Interacting with governments in the digital age: What do citizens think?
Most U.S. citizens acknowledge and accept that state and local government agencies share their personal data, even when it comes to personal information such as criminal …

Cyber risk assessment of U.S. election commissions finds critical areas for improvement
Many election commissions are focused on quickly adapting and updating their cybersecurity; however, commissions still need to dedicate resources to updating outdated …

Simjacker vulnerability actively exploited to track, spy on mobile phone owners
Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being …

How to navigate critical data security and privacy policy challenges
By 2020, there will be 40x more bytes of data than there are stars in the universe as we know it. And with data growth comes more security and privacy obstacles for …

More than a year after GDPR implementation, half of UK businesses are not fully compliant
52% of UK businesses are not fully compliant with the regulation, more than a year after its implementation, according to a survey of UK GDPR decision-makers conducted on …

281 BEC scammers arrested in worldwide law enforcement action
Federal authorities announced a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from …