searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

cyberattack

Get our top stories in your inbox

Surge in unique clients reporting brute-force attack attempts

July 1, 2020

There’s a significant uptick in the number of unique clients who have reported brute-force attack attempts, ESET reveals. Trend of RDP attack attempts against unique …

200% increase in invoice and payment fraud BEC attacks

June 30, 2020

There has been a 200 percent increase in BEC attacks focused on invoice or payment fraud from April to May 2020, according to Abnormal Security. This sharp rise continues the …

Massive complexity endangers enterprise endpoint environments

June 29, 2020

There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …

With remote working on the rise, infosec strategies need to evolve

June 26, 2020

The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having …

Core cybersecurity principles for new companies and products

June 26, 2020

The rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19 have shifted consumer behavior. The findings of a report by the World Economic …

Duration of application DDoS attacks increasing, some go on for days

June 25, 2020

There were seven major application DDoS attacks over the previous month — two of which lasted 5-6 days, Imperva reveals. Additionally, the team found that 47% of account …

Most malware in Q1 2020 was delivered via encrypted HTTPS connections

June 25, 2020

67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and 72% of encrypted malware was classified as zero day, so would have evaded signature-based …

Study of global hackers and the economics of security research

June 25, 2020

Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers …

New technique protects consumers from voice spoofing attacks

June 24, 2020

Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …

Consumer security concerns at an all-time high, but priorities have shifted

June 24, 2020

31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security survey. Consumer security …

How the pandemic affected DDoS attack patterns, global internet traffic

June 19, 2020

There has been a shift in internet traffic patterns coinciding with an increase in DDoS and other types of network attacks in recent months as organizations across industries …

Email security challenges and BEC trends during the pandemic

June 18, 2020

COVID-related attacks increased 436% between the second and third weeks of March 2020, with an average 173% week-over-week increase during the quarter, according to Abnormal …

Posts navigation

1 … 51 52 53 54 55 56 57 58 59 … 72

Featured news

  • Exploring the insecurity of readily available Wi-Fi networks
  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Researchers uncover ZuoRAT malware targeting home-office routers

Trends to watch when creating security strategy for the next two years

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Exploring the insecurity of readily available Wi-Fi networks

Don't miss

Researchers uncover ZuoRAT malware targeting home-office routers

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Trends to watch when creating security strategy for the next two years

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise