Please turn on your JavaScript for this page to function normally.
DDoS
Key observations on DDoS attacks in H1 2022

In the first half of 2022, the amount of DDoS attacks increased by 75.6% compared to the second half of 2021, according to new Nexusguard research revealed in the company’s …

car
Police breaks up criminal ring that hacked keyless systems to steal cars

A car theft ring that used fraudulent software to “hack” and steal vehicles with remote keyless entry and ignition systems has been dismantled by the French …

vmware
Attackers use novel technique, malware to compromise hypervisors and virtual machines

Unknown attackers wielding novel specialized malware have managed to compromise VMware ESXi hypervisors and guest Linux and Windows virtual machines, Mandiant threat analysts …

code
What you need to know about Evil-Colon attacks

While novel attacks seem to emerge faster than TikTok trends, some warrant action before they’ve even had a chance to surface. This is the case for an attack we’ll refer to as …

Go-Ahead
Go-Ahead cyberattack might derail UK public transport services

One of the UK’s largest public transport operators, Go-Ahead Group, has fallen victim to a cyberattack. The Go-Ahead Group, which connects people across its bus and rail …

BEC scams
How BEC attacks on human capital management systems are increasing

In this Help Net Security video, Jon Hencinski, VP of Security Operations at Expel, talks about how their SOC team has recently observed Business Email Compromise (BEC) …

ransomware
CISOs see little need for a point solution to cover ransomware risk

Nearly half of enterprises have fallen victim to a ransomware attack, of which nearly all have had little choice but to heed their attackers, according to the Q2 CISO Circuit …

DDoS
DDoS tales from the SOC

In this Help Net Security video, Bryant Rump, Principal Security Architect at Neustar Security Services, talks about the challenges of mitigating immense DDoS attacks. He …

attacks
How merchants can defend themselves against Magecart attacks

In this Help Net Security video, Angel Grant, VP of Security, F5, explains what Magecart attacks are and how they have evolved over the years. Grant illustrates how …

find
APT41 group: 4 malicious campaigns, 13 victims, new tools and techniques

Group-IB has released new research on the state-sponsored hacker group APT41. The Group-IB Threat Intelligence team estimates that in 2021 the threat actors gained access to …

attacks
Why there is no quick fix for cyber attacks

Cybersecurity threats keep evolving, meaning that most, if not all, organizations could be dangerously exposed as the digital ecosystem develops. While some organizations …

criminal
How attackers abuse Quickbooks to send phone scam emails

INKY researchers disclosed the latest variant of the tried-and-true phone scam, a low-tech phone scam where attackers extract personal information by sending out spoofed …

Don't miss

Cybersecurity news