Help Net Security

8 trends in government tech for an enterprise-focused approach to IT
Deloitte examined emerging trends in government technology, and highlighted eight trends that are shaping strategic and operational transformations and redefining IT’s …

Investigation uncovers Luminosity Link RAT distributors, victims are in the thousands
A hacking tool allowing cybercriminals to remotely gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers …

The new gold rush: A look inside cryptocurrency fraud
Cybercriminals are flooding to the new world of cryptocurrencies looking to exploit the boom in interest and adoption of these electronic currencies, according to Digital …

Macro-less malware: The cyclical attack
Last year, attackers linked to the Russian hacking group APT28 (sometimes called Fancy Bear) started hacking like its 1999 with Microsoft Word-based malware that doesn’t …

7 steps for getting your organization GDPR-ready
While the EU has had long established data protection standards and rules, its regulators haven’t truly commanded compliance until now. Under the General Data Protection …

Number of Internet-accessible ICS components is increasing every year
The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is …

Week in review: The future of smartphone security, automated cyber threat anticipation
Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security …

Groundhog Day: Third-party cyber risk edition
Over the past four years, I’ve had countless conversations with hundreds of companies around third-party cyber risk issues. It’s been my personal Groundhog Day, so …

Bomgar acquires Lieberman Software
Bomgar has acquired Lieberman Software, a provider of privileged identity and credential management software. Terms of the transaction were not disclosed. Remote access is the …

The future of smartphone security: Hardware isolation
Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they …

BEC scams surge, cybercriminals target nearly all organizations
96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017, according to Agari. “BEC is a particularly effective attack …

Innovative organizations build security into their cloud strategy
Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)