searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

threats

Get our top stories in your inbox

How past threats and technical developments influence the evolution of malware

June 24, 2019

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution …

Botnets shift from Windows towards Linux and IoT platforms

June 20, 2019

Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …

Organizations are advancing their efforts, investing in OT cybersecurity programs

June 14, 2019

ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing …

When it comes to email-based threats, Emotet dominates

May 29, 2019

Emotet displaced credential stealers, stand-alone downloaders and RATs and became the most prominent threat delivered via email, Proofpoint has shared. According to the …

Most security pros have considered quitting due to a lack of resources

May 24, 2019

Companies are suffering from a lack of resources, both in terms of people and technology (79 percent), and 72 percent have considered leaving their jobs for this reason, …

Prioritizing risks in a climate of geopolitical threats

May 14, 2019

The cybersecurity landscape has become increasingly hostile in recent years, with a growing threat from common cybercriminals as well as the looming shadow of state-level …

Which cyber threats should financial institutions be on the lookout for?

April 30, 2019

Banks and financial services organizations were the targets of 25.7 percent of all malware attacks last year, more than any other industry, IntSigths revealed in their latest …

Slack warns investors it might be targeted by organized crime, nation-state hackers

April 29, 2019

Slack Technologies, the company whose cloud-based collaboration tools and services are used by companies worldwide, has warned potential investors that the company faces …

Which employees receive the most highly targeted email-borne threats?

April 24, 2019

Workers in R&D/Engineering are the most heavily targeted group of employees within organizations, a new Proofpoint report says, and lower-level employees are at a higher …

Securing your home increasingly means securing all of your IoT devices

April 3, 2019

The Internet of Things explosion has proven controversial due to the insufficient security measures in many of these internet-connected devices. IoT attacks increase And a new …

Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience

March 28, 2019

66 percent of companies say their c-suite executives are supportive of their IoT implementation, but even with strong support they noted there are hurdles to overcome. A …

Encrypted attacks growing steadily, cybercriminals are increasingly targeting non-standard ports

March 27, 2019

In 2018, SonicWall recorded the decline of cryptojacking, but more ransomware, highly targeted phishing, web application attacks and encrypted attacks. The company’s …

Posts navigation

1 … 76 77 78 79 80 81 82

Featured news

  • CISO-approved strategies for software supply chain security
  • Phishers use encrypted file attachments to steal Microsoft 365 account credentials
  • New Buhti ransomware uses leaked payloads and public exploits
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

CISO-approved strategies for software supply chain security

Phishers use encrypted file attachments to steal Microsoft 365 account credentials

New Buhti ransomware uses leaked payloads and public exploits

Strengthening travel safety protocols with ISO 31030

Phishing campaign targets ChatGPT users

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us