searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

brute-force

Get our top stories in your inbox

Sharp rise in SMB cyberattacks by Russia and China

March 9, 2022

SaaS Alerts unveiled the findings of its latest report which analyzed approximately 136 million SaaS security events across 2,100 small and medium businesses (SMBs) globally …

End of 2021 witnessed an explosion of RDP brute-force attacks

February 9, 2022

RDP brute-force attacks continue to be one of the most used attack vectors for breaching enterprise networks, ESET’s latest Threat Report has revealed. RDP brute-force …

Secure your databases against opportunistic attackers

October 19, 2021

If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised quickly. According to findings by Radoslaw Zdonczyk, …

Surge in unique clients reporting brute-force attack attempts

July 1, 2020

There’s a significant uptick in the number of unique clients who have reported brute-force attack attempts, ESET reveals. Trend of RDP attack attempts against unique …

Are your MS SQL servers part of a cryptomining botnet? Check now!

April 2, 2020

For the last two years or so, attackers have been infecting and reinfecting poorly secured MS SQL servers, booting other criminals’ malware from them and exploiting …

Thwart the pressing threat of RDP password attacks

July 23, 2019

How long does it takes for Internet-facing, RDP-enabled computers to come under attack? In some cases, a few minutes. In most, less than 24 hours. The problem with RDP …

Attackers are exploiting IMAP to bypass MFA on Office 365, G Suite accounts

March 20, 2019

Where possible, and especially for important accounts such as Office 365 and G Suite accounts, the prevailing advice for users is to enable two-factor authentication. …

Linux servers hit with FairWare ransomware – or is it just a scam?

August 30, 2016

Users posting on Bleeping Computer’s forums have alerted the world to a new threat targeting Linux server admins: the FairWare ransomware. Whether the ransomware …

Short URLs plus cloud services equal bad security

April 15, 2016

Short URLs are great when they lead to public websites, and documents and files that aren’t meant to remain private, but you should think twice about using them to lead …

Featured news

  • The challenges and advantages of building behavior-based threat detection
  • Product showcase: Group-IB Unified Risk Platform
  • How businesses are prioritizing data privacy
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

New infosec products of the week: July 1, 2022

Product showcase: Group-IB Unified Risk Platform

The challenges and advantages of building behavior-based threat detection

Infosec products of the month: June 2022

Don't miss

The challenges and advantages of building behavior-based threat detection

Product showcase: Group-IB Unified Risk Platform

Evaluating the use of encryption across the world’s top one million sites

Evolving online habits have paved the way for fraud. What can we do about it?

How businesses are prioritizing data privacy

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise