Advertisement
Top

Tag: threats


Threats & Malware, Virus & Malware

Organizations would like the government to help with ransomware demand costs

August 12, 2022

Via: Help Net Security

Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to […]


Threats & Malware, Virus & Malware

McAfee expands collaboration with Visa to protect people and businesses from threats

July 25, 2022

Via: Help Net Security

McAfee expanded partnership with Visa that enables Visa partners in the United Kingdom to offer online protection solutions to Visa Business cardholders. In an increasingly digitized world, small businesses find themselves a key target of hackers, with more than half of the data […]


Data loss, Threats & Malware

Dealing with threats and preventing sensitive data loss

July 11, 2022

Via: Help Net Security

Recently, Normalyze, a data-first cloud security platform, came out of stealth with $22.2M in Series A funding. This was the perfect time to catch up with co-founder and CEO Amer Deeba. In this interview with Help Net Security, he talks […]


Application security, Security

Empower Your Security Operations Team to Combat Emerging Threats

July 7, 2022

Via: Dark Reading

The implementation of defense-in-depth architectures and operating system hardening technologies have altered the threat landscape. Historically, zero-click, singular vulnerabilities were commonly discovered and exploited. The modern-day defensive posture requires attackers to successfully chain together multiple exploit techniques to gain control […]


Access control, Security

Buggy ‘Log in With Google’ API Implementation Opens Crypto Wallets to Account Takeover

July 7, 2022

Via: Dark Reading

A cryptocurrency wallet service provider serving more than 2 million users worldwide and managing about $3 billion worth of Bitcoin was found to contain API vulnerabilities tied to how external authentication logins were implemented. The bugs are fixed, but the […]


Data loss, Threats & Malware

Hacker Claims Major Chinese Citizens’ Data Theft

July 5, 2022

Via: Security Week

A sample of 750,000 entries posted online by the hacker showed citizens’ names, mobile phone numbers, national ID numbers, addresses, birthdays and police reports they had filed. AFP and cybersecurity experts have verified some of the citizen data in the […]


Cyber-crime, Phishing

Phishing reaches all-time high in early 2022

June 15, 2022

Via: Help Net Security

The APWG’s Phishing Activity Trends Report reveals that in the first quarter of 2022 there were 1,025,968 total phishing attacks—the worst quarter for phishing observed to date. This quarter was the first time the three-month total has exceeded one million. […]


Network security, Security

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

June 3, 2022

Via: Help Net Security

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted at cybersecurity and IT professionals in both the U.S. and UK. The problem with […]


Threats & Malware, Vulnerabilities

Can we trust the cybersecurity of the energy sector?

May 25, 2022

Via: Help Net Security

A research published by DNV reveals that energy executives anticipate life, property, and environment-compromising cyberattacks on the sector within the next two years. The report finds that more than four-fifths of professionals working in the power, renewables, and oil and […]


Cyber-crime, Identity theft

Fraudsters answer security questions better than customers

April 26, 2022

Via: Help Net Security

Pindrop released a report uncovering how companies might be accidentally inviting fraud, threat mongers from the dark web and bad actors better prepared to pass authentication. Data dealers are growing more sophisticated, offering more service, more details, and more organized […]


Threats & Malware, Virus & Malware

How prepared are organizations to face a ransomware attack on Kubernetes?

March 18, 2022

Via: Help Net Security

Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. Kubernetes is being rapidly deployed into mission-critical environments in organizations around the world, the research showed, […]


Network security, Security

Data Transparency Hasn’t Made Us Safer Yet. Can It Uncover Breach Causality?

February 10, 2022

Via: Dark Reading

Company leaders worldwide are making huge investments to improve security, but they’re still awaiting a big return. According to Gartner, global spending on information security and risk management is expected to top $150 billion this year. One survey found its […]


Cyber-crime, Malware

How cybercriminals are using malware to target Linux-based operating systems

February 9, 2022

Via: Help Net Security

As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and […]


Cyber-crime, Malware, Phishing

End of 2021 witnessed an explosion of RDP brute-force attacks

February 9, 2022

Via: Help Net Security

RDP brute-force attacks continue to be one of the most used attack vectors for breaching enterprise networks, ESET’s latest Threat Report has revealed. RDP brute-force attacks escalated throughout all of 2020 and 2021, and the last four months of 2021 […]


Cyber-crime, Phishing

The life cycle of phishing pages

December 9, 2021

Via: Securelist

Introduction In this study, we analyzed how long phishing pages survive as well as the signs they show when they become inactive. In addition to the general data, we provided a number of options for classifying phishing pages according to […]


Network security, Security

Industrial cybersecurity market to reach $22.3 billion by 2026

November 12, 2021

Via: Help Net Security

The global market for industrial cybersecurity estimated at $15.2 billion in the year 2020, is projected to reach a revised size of $22.3 billion by 2026, growing at a CAGR of 6.6% over the analysis period, according to ResearchAndMarkets. Services, […]


Network security, Security

72% of organizations hit by DNS attacks in the past year

October 26, 2021

Via: Help Net Security

Domain name system (DNS) attacks are impacting organizations at worrisome rates. According to a survey from the Neustar International Security Council (NISC) conducted in September 2021, 72% of study participants reported experiencing a DNS attack within the last 12 months. […]


Threats & Malware, Vulnerabilities

Critical infrastructure IoT security: Going back to basics

October 6, 2021

Via: Help Net Security

We are witnessing numerous and damaging attacks on critical infrastructure lately. What is the main cause that makes them susceptible to these attacks? Over recent years, attacks on critical infrastructure have grown from moderate risk to major headline-grabbing news and […]


Cyber warfare, Cyber-crime

Nation-state attacks fears grow, execs don’t trust governments to protect them from cyber threats

September 30, 2021

Via: Help Net Security

Arctic Wolf published findings from a recent global survey of over 1,400 IT decision-makers at enterprise organizations. After a year of high-profile cyberattacks, the survey data reveals executive attitudes on a wide array of cybersecurity and business issues. Private sector […]


Cloud security, Security

Qumulo Recover Q addresses and defends data protection on-premises and in the cloud

September 24, 2021

Via: Help Net Security

Qumulo unveiled Qumulo Recover Q, a business continuity and disaster recovery solution that bolsters existing strategies to help guard against and react to ransomware threats. The new solution helps customers minimize the attack surface threat actors target and leverages disaster […]