• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up
  • NIST Cybersecurity Framework: Five years later
  • Snapd flaw gives attackers root access on Linux systems

phishing

Get our Top Stories to your inbox
person

Impersonation, sender forgery and corporate email spoofing top the charts

  • February 13, 2019
  • cyberattack
  • cybercrime
  • cybercriminals

This Q4 of 2018 was a busy period for phishing scammers. INKY researchers saw a spike in email volume this time of year as people use email to gather their receipts from …

rings

88% of UK businesses breached during the last 12 months

  • February 12, 2019
  • Carbon Black
  • cybersecurity
  • data breach

The UK’s cyber threat environment is intensifying. Attacks are growing in volume, and the average number of breaches has increased, according to Carbon Black. Key survey …

zero

Zero Trust browsing: Protect your organization from its own users

  • February 11, 2019
  • cryptojacking
  • cybercrime
  • cybersecurity

To the casual observer, the cyberattack landscape is constantly shifting. In recent years, the threats and scams have evolved from Nigerian princes to stranded travelers, …

person

Safeguarding your data from human error and phishing attacks with the cloud

  • February 1, 2019
  • AODocs
  • cybersecurity
  • human error

This is the third article of a series, the first article is available here, and the second one is here. In a world of ransomware attacks, companies should prepare for the …

email

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate

  • February 1, 2019
  • Agari
  • cybercrime
  • cybersecurity

Account takeover-based (ATO) attacks now comprise 20 percent of advanced email attacks, according to Agari’s Q1 2019 Email Fraud & Identity Deception Trends report. …

danger

83% of global respondents experienced phishing attacks in 2018

  • January 25, 2019
  • cyber risk
  • cybersecurity
  • endpoint security

Proofpoint analyzed data from tens of millions of simulated phishing attacks sent over a one-year period, along with nearly 15,000 cybersecurity professional survey responses, …

phishing

Microsoft remains the most impersonated brand, Netflix phishing spikes

  • January 24, 2019
  • cybercrime
  • Microsoft
  • Netflix

Although Microsoft remains the top target for phishers, Netflix saw an incredible surge in Dec., making it the second most impersonated brand in Q4 2018, according to Vade …

person

Cybercrime gangs continue to innovate to hide their crimes

  • December 17, 2018
  • APWG
  • cybercrime
  • phishing

According to the APWG’s new Phishing Activity Trends Report, after spiking in the spring, phishing has been taking place at a steady pace — but phishers are using new …

PayPal

Android Trojan steals money from victims’ PayPal account

  • December 12, 2018
  • Android
  • cybercrime
  • ESET

ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s …

Microsoft Word

Word documents seemingly carrying videos can deliver malicious code instead

  • October 29, 2018
  • malware
  • Microsoft
  • MS Office

A feature that allows anyone to embed a video directly in a Word document can be easily misused to trick target users into downloading and running malware, Cymulate …

Posts navigation

1 2 3 4 5 6 … 56 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

bot

Machine learning fundamentals: What cybersecurity professionals need to know

programmer

Three reasons employee monitoring software is making a comeback

vault

Bank of Valletta suspended all operations in wake of cyber attack

Don't miss

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

users

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX