searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

threats

Get our top stories in your inbox

The 25 most impersonated brands in phishing attacks

February 11, 2020

PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …

Phishers impersonate WHO, exploit coronavirus-related anxiety

February 7, 2020

Media outlets are reporting daily on the coronavirus outbreak in Wuhan and the emergency repatriation of foreign citizens that found themselves in the thick of it. As cases of …

How IoT devices open a portal for chaos across the network

February 6, 2020

Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, …

68% of organizations were victims of endpoint attacks in 2019

January 31, 2020

Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security …

Privacy ROI: Benefits from data privacy averaging 2.7 times the investment

January 30, 2020

Customer demands for increased data protection and privacy, the ongoing threat of data breaches and misuse by both unauthorized and authorized users, and preparation for the …

Are businesses prepared for an extinction-level cyber event?

January 29, 2020

In an era of technological transformation and cyber everywhere, the attack surface is exponentially growing as cyber criminals attack operational systems and backup …

Cybercriminals using fake job listings to steal money, info from applicants

January 23, 2020

Be extra careful when looking for a job online, the Internet Crime Complaint Center (IC3) warns: cybercriminals are using fake job listings to trick applicants into sharing …

Email security industry miss rates when encountering threats are higher than 20%

January 22, 2020

Email security miss rates are definitely a huge issue. Malicious files regularly bypass all of today’s leading email security products, leaving enterprises vulnerable to …

How to govern cybersecurity risk at the board level

January 17, 2020

Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security …

Emotet remains the dark market leader for delivery-as-a-service

January 16, 2020

The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, …

Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities

January 15, 2020

Information Technology spending by Department of Defense (DOD) and Intelligence Community (IC) agencies will continue to grow as they work to keep pace with the evolution of …

2020 forecast: Attackers will target non-traditional systems

January 14, 2020

While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. …

Posts navigation

1 … 71 72 73 74 75 76 77 78 79 … 82

Featured news

  • Google triples reward for Chrome full chain exploits
  • MOVEit Transfer zero-day attacks: The latest info
  • Qakbot: The trojan that just won’t go away
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

Google triples reward for Chrome full chain exploits

MOVEit Transfer zero-day attacks: The latest info

Qakbot: The trojan that just won’t go away

How defense contractors can move from cybersecurity to cyber resilience

Introducing the book: Cybersecurity First Principles

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us