searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

cyberattack

Get our top stories in your inbox

Telehealth is the future of healthcare, but how secure is it?

August 19, 2020

54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals. Of those, more than 70 percent of respondents plan to continue to use …

Publicly reported data breaches down 52%, exposed records way up!

August 18, 2020

Although the number of publicly reported data breaches stands at its lowest in five years, the number of records exposed is more than four times higher than any previously …

Healthcare breaches declined sharply during the first half of 2020

August 17, 2020

This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …

Surge in cyber attacks targeting open source software projects

August 13, 2020

There has been a massive 430% surge in next generation cyber attacks aimed at actively infiltrating open source software supply chains, Sonatype has found. Rise of next-gen …

Expanding attack surfaces leave security teams stretched thin

August 12, 2020

30% of businesses globally have seen an increase in attacks on their IT systems as a result of the pandemic, HackerOne reveals. This is according to C-Level IT and security …

Attackers have created a specialized economy around email account takeover

July 27, 2020

Barracuda released key findings about the ways cybercriminals are attacking and exploiting email accounts. The report reveals a specialized economy emerging around email …

Integrated cloud-native security platforms can overcome limitations of traditional security products

July 27, 2020

To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial …

Cybersecurity teams are struggling with a lack of visibility into key security controls

July 22, 2020

89% of security professionals are most concerned about phishing, web and ransomware attacks. This is especially alarming, considering that only 48% confirm that they have …

20,000+ new vulnerability reports predicted for 2020, shattering previous records

July 22, 2020

Over 9,000 new vulnerabilities have been reported in the first six months of 2020, and we are on track to see more than 20,000 new vulnerability reports this year — a new …

Overconfident about their security, businesses are falling victims to bot attacks

July 20, 2020

Many businesses are at risk from bot attacks, despite an awareness of the problem and a widely held belief that they have the problem under control, Netacea reveals. Global …

New wave of attacks aiming to rope home routers into IoT botnets

July 17, 2020

A Trend Micro research is warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. The report urges users to take …

Most global brands fail to implement security controls to prevent data leakage and theft

July 17, 2020

The global pandemic has seen the web take center stage. Banking, retail and other industries have seen large spikes in web traffic, and this trend is expected to become …

Posts navigation

1 … 49 50 51 52 53 54 55 56 57 … 72

Featured news

  • Exploring the insecurity of readily available Wi-Fi networks
  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Researchers uncover ZuoRAT malware targeting home-office routers

Trends to watch when creating security strategy for the next two years

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Exploring the insecurity of readily available Wi-Fi networks

Don't miss

Researchers uncover ZuoRAT malware targeting home-office routers

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Trends to watch when creating security strategy for the next two years

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise