searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

threats

Get our top stories in your inbox
mobile

As attackers get more creative, mobile threats and attacks increase in both quantity and impact

August 5, 2019

It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility …

ransomware

Ransomware attack leaves Johannesburg residents without electricity

July 26, 2019

A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …

wolf

Most SMBs have not identified and documented cybersecurity threats

July 25, 2019

A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, …

danger

Cyberthreats targeting municipalities are on the rise

July 23, 2019

Through the first half of 2019, a growing number of municipalities across the US were hit with crippling ransomware attacks, while several large companies disclosed data …

AWS

New open source solution reduces the risks associated with cloud deployments

July 19, 2019

An open source user computer environment (UCE) for the Amazon Cloud, called Galahad, has been launched by the University of Texas at San Antonio (UTSA). The technology will …

mobile apps

How mobile use cases in financial services are affecting security

July 11, 2019

Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “​Mobile Security in the Financial Services​,” includes analysis …

businessman

Experts weigh in on salient issues around emerging threats and security tech

July 8, 2019

RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …

question

Where are organizations stalling with cybersecurity best practices?

June 27, 2019

UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced, according to NTT Security. …

Fire

How past threats and technical developments influence the evolution of malware

June 24, 2019

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution …

Botnets shift from Windows towards Linux and IoT platforms

June 20, 2019

Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …

industrial

Organizations are advancing their efforts, investing in OT cybersecurity programs

June 14, 2019

ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing …

world biohazard

When it comes to email-based threats, Emotet dominates

May 29, 2019

Emotet displaced credential stealers, stand-alone downloaders and RATs and became the most prominent threat delivered via email, Proofpoint has shared. According to the …

Posts navigation

1 2 3 4 5 6
eye

Top 5 cybersecurity predictions for 2020

  • DNS over HTTPS’ threat to enterprise security
  • The hidden risks of cryptojacking attacks
  • Review: Cyber Smart
  • Avoiding the next breach: Four tips for securing your apps
Spot light
(IN)SECURE Magazine issue 64 released

What's new

Microsoft impersonate

Compromised passwords used on 44 million Microsoft accounts

lock

Key security priorities for financial services: Preventing fraud and data leaks

cloud

Most enterprises hit cloud migration problems, still run apps on legacy operating systems

Network

DNS over HTTPS’ threat to enterprise security

eye

Top 5 cybersecurity predictions for 2020

(IN)SECURE 64

(IN)SECURE Magazine issue 64 released

Don't miss

Microsoft impersonate

Compromised passwords used on 44 million Microsoft accounts

(IN)SECURE 64

(IN)SECURE Magazine issue 64 released

eye

Top 5 cybersecurity predictions for 2020

Network

DNS over HTTPS’ threat to enterprise security

lock

Key security priorities for financial services: Preventing fraud and data leaks

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • 5G IoT security: Opportunity comes with risks
  • Preventing insider threats, data loss and damage through zero trust
  • Hackers helping communities: Leveraging OSINT to find missing persons
  • Your supplier’s BEC problem is your BEC problem

(IN)SECURE Magazine ISSUE 64 (December 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
Read online
© Copyright 1998-2019 by Help Net Security
Read our privacy policy | About us | Advertise