Help Net Security
XOR DDoS botnet launching attacks from compromised Linux machines
Attackers have developed a botnet capable of 150+ Gbps DDoS attack campaigns using XOR DDoS, a Trojan malware used to hijack Linux systems, according to Akamai.What is XOR …
Do security flaws with life-threatening implications need alternative disclosure?
If security researchers get no response from manufacturers when disclosing vulnerabilities with life-threatening implications, the majority of IT security professionals (64%) …
How to avoid data breaches? Start by addressing human error
Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …
The evolution of the CISO in today’s digital economy
As the digital economy becomes ever more connected and encompasses all industries, we’re reaching a point where every company today is a technology company. Along with this …
Exabeam secures $25 million in Series B funding
Exabeam closed a $25 million financing round to further accelerate the company’s growth and continue updating its user behavior analytics (UBA) solution.Icon Ventures …
How organizations can increase trust and resilience
Gartner said organizations must invest in three risk disciplines to increase trust and resilience. Running a digital business presents business leaders with an increasing …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
Is your network suffering from the trombone effect?
Trombones are wonderful instruments. These brass beauties are mainstays of any marching band, dutifully producing a bouncing bass tone. Some trombones, however, generate a …
Infographic: Devaluing data, fighting cybercrime
For any organization connected to the Internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from …
Week in review: Apple tackles XcodeGhost malware, AVG will sell user data, iOS 9 exploit is worth $1 million
Here’s an overview of some of last week’s most interesting news and articles:Symantec fires employees who issued rogue Google certificatesOne of these testing …
Enhancing email security in Office 365
The need for corporate security has never been greater. Identity theft remains a lucrative crime, and we read about a major hack nearly every day. Companies moving to Office …
Mobile payments data breaches expected to grow
A survey of 900 cybersecurity experts shows an overwhelming majority (87%) expect an increase in mobile payment data breaches over the next 12 months, yet 42% have used this …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations