Help Net Security

A third of 2018’s vulnerabilities have public exploits, 50% can be exploited remotely
Over 22,000 new vulnerabilities were disclosed during 2018, according to Risk Based Security’s 2018 Year End Vulnerability QuickView Report. While approximately 33% of …

IT teams are struggling with network infrastructure challenges caused by the cloud
Public cloud adoption is growing by double-digit percentages year over year, and the public cloud market is expected to exceed $220 billion by the end of 2019, according to …

Organizations are seeing integration challenges hinder digital transformation initiatives
While 97 percent of organizations are currently undertaking or planning to undertake digital transformation initiatives, integration challenges are hindering efforts for 84 …

Week in review: Social media-enabled cybercrime, fighting credential stuffing, digital signature spoofing
Here’s an overview of some of last week’s most interesting news and articles: How WebAuthn aims to solve the password problem Rather than tasking users with …

Enterprises are blind to over half of malware sent to their employees
As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible …

Businesses need to rethink security priorities due to shifting trends
One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup …

40% of malicious URLs were found on good domains
While tried-and-true attack methods are still going strong, new threats emerge daily, and new vectors are being tested by cybercriminals, according to the 2019 Webroot Threat …

By 2025 workforce most likely to consist of humans and bots
The workforce, workplace, and the technologies that support them will be so different by 2025 that enterprises need to provide global access and ensure continuous uptime now. …

ENISA provides recommendations to improve the cybersecurity of EU electoral processes
In the context of the upcoming elections for the European Parliament, the EU Agency for Cybersecurity ENISA published an opinion paper on the cybersecurity of elections and …

Cloud business initiatives accelerating faster than security teams’ ability to secure them
The speed of cloud business initiatives is hampering organizations’ ability to secure and manage hybrid environments, with security personnel often not included. The 2019 …

Attackers continue to enhance their performance, apply smart business techniques
During the second half of 2018, attackers bulked up existing tactics, rapidly evolvied new performance enhancements, and applied smart business techniques to vastly accelerate …

Privileged credential abuse is involved in 74% of data breaches
Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems