attacks

APT groups are getting personal, and CISOs should be concerned

APT groups are getting personal, and CISOs should be concerned 2025-08-12 at 14:42 By Mirko Zorz Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work remotely, store […]

React to this headline:

Loading spinner

APT groups are getting personal, and CISOs should be concerned Read More »

Why DNS threats should be on every CISO’s radar in 2025

Why DNS threats should be on every CISO’s radar in 2025 2025-08-12 at 07:32 By Sinisa Markovic DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox, attackers are changing tactics, and enterprises are feeling the pressure. The report shows that DNS is being used

React to this headline:

Loading spinner

Why DNS threats should be on every CISO’s radar in 2025 Read More »

How Brandolini’s law informs our everyday infosec reality

How Brandolini’s law informs our everyday infosec reality 2025-08-11 at 09:00 By Help Net Security Brandolini’s law, also known as the “bullshit asymmetry principle”, is simple but devastating: “The amount of energy needed to refute bullshit is an order of magnitude bigger than to produce it.” While it’s often thrown around in political debates and

React to this headline:

Loading spinner

How Brandolini’s law informs our everyday infosec reality Read More »

Ransomware is up, zero-days are booming, and your IP camera might be next

Ransomware is up, zero-days are booming, and your IP camera might be next 2025-08-06 at 08:47 By Help Net Security Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging 20

React to this headline:

Loading spinner

Ransomware is up, zero-days are booming, and your IP camera might be next Read More »

Ransomware groups shift to quadruple extortion to maximize pressure

Ransomware groups shift to quadruple extortion to maximize pressure 2025-08-05 at 07:33 By Help Net Security Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware extortion tactics (Source: Akamai) The emerging trend of quadruple extortion includes using DDoS attacks to

React to this headline:

Loading spinner

Ransomware groups shift to quadruple extortion to maximize pressure Read More »

Your app is under attack every 3 minutes

Your app is under attack every 3 minutes 2025-07-24 at 11:57 By Help Net Security Application-layer attacks have become one of the most common and consequential methods adversaries use to gain access and compromise organizations, according to Contrast Security. These attacks target the custom code, APIs, and logic that power applications, often slipping past detection

React to this headline:

Loading spinner

Your app is under attack every 3 minutes Read More »

Ports are getting smarter and more hackable

Ports are getting smarter and more hackable 2025-07-23 at 08:31 By Sinisa Markovic A new policy brief from NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) warns that critical port infrastructure, responsible for 80 percent of global trade, is increasingly under attack by threat actors tied to Russia, Iran, and China. These ports are essential

React to this headline:

Loading spinner

Ports are getting smarter and more hackable Read More »

NTLM relay attacks are back from the dead

NTLM relay attacks are back from the dead 2025-07-04 at 09:32 By Help Net Security NTLM relay attacks are the easiest way for an attacker to compromise domain-joined hosts. While many security practitioners think NTLM relay is a solved problem, it is not – and, in fact, it may be getting worse. Anecdotally, they are

React to this headline:

Loading spinner

NTLM relay attacks are back from the dead Read More »

ClickFix attacks skyrocketing more than 500%

ClickFix attacks skyrocketing more than 500% 2025-06-26 at 12:02 By Sinisa Markovic ClickFix, a deceptive attack method, saw a surge of more than 500% in the first half of 2025, making it the second most common attack vector after phishing, according to ESET’s latest Threat Report. The report, which looks at trends from December 2024

React to this headline:

Loading spinner

ClickFix attacks skyrocketing more than 500% Read More »

How to manage your cyber risk in a modern attack surface

How to manage your cyber risk in a modern attack surface 2025-06-04 at 09:01 By Help Net Security According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76% of organizations also reported a cyberattack due to an exposed asset in 2024, as expanding digital footprints

React to this headline:

Loading spinner

How to manage your cyber risk in a modern attack surface Read More »

DDoS attacks jump 358% compared to last year

DDoS attacks jump 358% compared to last year 2025-04-29 at 08:04 By Mirko Zorz Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared to the same time last year. Their Q1 2025 DDoS report highlights a rise in the number and size of attacks,

React to this headline:

Loading spinner

DDoS attacks jump 358% compared to last year Read More »

Cyber threats against energy sector surge as global tensions mount

Cyber threats against energy sector surge as global tensions mount 2025-04-17 at 12:02 By Help Net Security Cyberattacks targeting the energy sector are increasing, driven by a host of geopolitical and technological factors. A report published by Sophos in July 2024, and which surveyed 275 cybersecurity and IT leaders from the energy, oil/gas, and utilities

React to this headline:

Loading spinner

Cyber threats against energy sector surge as global tensions mount Read More »

How to map and manage your cyber attack surface with EASM

How to map and manage your cyber attack surface with EASM 2025-04-02 at 16:10 By Help Net Security In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern attack surfaces, it’s important to adopt an attacker-centric approach. In this article,

React to this headline:

Loading spinner

How to map and manage your cyber attack surface with EASM Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

Massive botnet hits Microsoft 365 accounts

Massive botnet hits Microsoft 365 accounts 2025-02-24 at 15:16 By Help Net Security A recently discovered botnet of over 130,000 compromised devices is launching coordinated password-spraying attacks against Microsoft 365 (M365) accounts. Security researchers at SecurityScorecard are examining possible connections to China-affiliated threat actors, citing evidence of infrastructure linked to CDS Global Cloud and UCLOUD

React to this headline:

Loading spinner

Massive botnet hits Microsoft 365 accounts Read More »

Cybercriminals shift focus to social media as attacks reach historic highs

Cybercriminals shift focus to social media as attacks reach historic highs 2025-02-18 at 18:01 By Help Net Security A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were blocked – an astonishing rate of 321 per second. The

React to this headline:

Loading spinner

Cybercriminals shift focus to social media as attacks reach historic highs Read More »

Defense strategies to counter escalating hybrid attacks

Defense strategies to counter escalating hybrid attacks 2025-01-23 at 07:33 By Zeljka Zorz In this Help Net Security interview, Tomer Shloman, Sr. Security Researcher at Trellix, talks about attack attribution, outlines solutions for recognizing hybrid threats, and offers advice on how organizations can protect themselves against hybrid attacks. What are the most promising technologies or

React to this headline:

Loading spinner

Defense strategies to counter escalating hybrid attacks Read More »

Mirai botnet behind the largest DDoS attack to date

Mirai botnet behind the largest DDoS attack to date 2025-01-22 at 17:20 By Zeljka Zorz Researchers have uncovered two Mirai-based botnets harnessing Internet of Things (IoT) devices to DDoS target organizations around the world. The Murdoc botnet Qualys researchers have laid bare the “Murdoc” botnet, consisting of some 1,300 IoT devices saddled with a variant

React to this headline:

Loading spinner

Mirai botnet behind the largest DDoS attack to date Read More »

Balancing usability and security in the fight against identity-based attacks

Balancing usability and security in the fight against identity-based attacks 2025-01-17 at 08:04 By Mirko Zorz In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and how AI and ML are both fueling these threats and helping to

React to this headline:

Loading spinner

Balancing usability and security in the fight against identity-based attacks Read More »

Using cognitive diversity for stronger, smarter cyber defense

Using cognitive diversity for stronger, smarter cyber defense 2025-01-15 at 07:03 By Mirko Zorz In this Help Net Security interview, Mel Morris, CEO of Corpora.ai, discusses how cognitive biases affect decision-making during cybersecurity incidents. Morris shares insights on the challenges of designing user-friendly cybersecurity tools that consider human cognitive processes. How do cognitive biases impact

React to this headline:

Loading spinner

Using cognitive diversity for stronger, smarter cyber defense Read More »

Scroll to Top