searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Black Hat USA 2022: Videos, news, interviews – our complete coverage is here!

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

cybercrime

Get our top stories in your inbox

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

June 28, 2022

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have …

Threat actors increasingly use third parties to run their scams

June 28, 2022

Abnormal Security released new research that showcases a rising trend in financial supply chain compromise as threat actors impersonate vendors more than ever before. In …

Python packages with malicious code expose secret AWS credentials

June 27, 2022

Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and …

How phishing attacks are becoming more sophisticated

June 27, 2022

The latest APWG’s Phishing Activity Trends Report reveals that in the first quarter of 2022 there were 1,025,968 total phishing attacks—the worst quarter for phishing observed …

Cybercriminals use Azure Front Door in phishing attacks

June 27, 2022

Resecurity, Inc. (USA) has identified a spike in phishing content delivered via Azure Front Door (AFD), a cloud CDN service provided by Microsoft. The identified resources in …

What stolen info can be bought off the dark web, and for how much?

June 24, 2022

Privacy Affairs researchers concluded criminals using the dark web can get a complete set of a person’s account details, enabling them to create fake IDs and forge private …

Conti effectively created an extortion-oriented IT company, says Group-IB

June 23, 2022

In slightly more than a month, the Conti ransomware collective compromised more than 40 companies worldwide, and the fastest attack took only three days, Group-IB’s noted in …

Automotive hose manufacturer hit by ransomware, shuts down production control system

June 23, 2022

A US subsidiary of Nichirin Co., a Japan-based company manufacturing and selling automotive hoses and hose parts, has been hit with ransomware, which resulted in the shut down …

Inside a large-scale phishing campaign targeting millions of Facebook users

June 23, 2022

In this video for Help Net Security, Nick Ascoli, VP of Threat Research, PIXM, discusses a massive phishing campaign has successfully stolen an estimated five million Facebook …

Attack methods using hybrid bots enable criminals to open mule accounts at scale

June 23, 2022

During the first half of 2022, BioCatch data reveals that money mule accounts represent up to 0.3 percent of accounts held by financial institutions, and an estimated $3 …

The price of stolen info: Everything on sale on the dark web

June 22, 2022

What is the price for personal information, including credit cards and bank accounts, on the dark web? Privacy Affairs researchers concluded criminals using the dark web need …

After being breached once, many companies are likely to be hit again

June 21, 2022

Cymulate announced the results of a survey, revealing that two-thirds of companies who have been hit by cybercrime in the past year have been hit more than once, with almost …

Posts navigation

1 2 3 4 5 6 7 … 153

Featured news

  • Black Hat USA 2022 video walkthrough
  • Implementing zero trust for a secure hybrid working enterprise
  • SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow
Cisco has been hacked by a ransomware gang

What's new

Which malware delivery techniques are currently favored by attackers?

Photos: Black Hat USA 2022

SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow

Photos: Black Hat USA 2022, part 2

Don't miss

Cisco has been hacked by a ransomware gang

Which malware delivery techniques are currently favored by attackers?

Black Hat USA 2022 video walkthrough

Implementing zero trust for a secure hybrid working enterprise

SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • The challenges of managing the modern external attack surface
  • Understanding your attack surface is key to recognizing what you are defending
  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise