attacks

State-sponsored hackers know enterprise VPN appliances inside out

State-sponsored hackers know enterprise VPN appliances inside out 2024-02-28 at 14:19 By Zeljka Zorz Suspected Chinese state-sponsored hackers who have been leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hunters. They were able to perform a […]

React to this headline:

Loading spinner

State-sponsored hackers know enterprise VPN appliances inside out Read More »

Cybersecurity sectors adjust as DDoS attacks reach new heights

Cybersecurity sectors adjust as DDoS attacks reach new heights 2024-02-16 at 07:05 By Help Net Security In this Help Net Security video, Andrey Slastenov, Head of Security Department at Gcore, discusses the findings of their latest report that provide insights into the current state of the DDoS protection market and cybersecurity trends. Key highlights from

React to this headline:

Loading spinner

Cybersecurity sectors adjust as DDoS attacks reach new heights Read More »

How threat actors abuse OAuth apps

How threat actors abuse OAuth apps 2024-02-08 at 06:31 By Help Net Security OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights on how

React to this headline:

Loading spinner

How threat actors abuse OAuth apps Read More »

Enhancing adversary simulations: Learn the business to attack the business

Enhancing adversary simulations: Learn the business to attack the business 2024-02-07 at 07:01 By Mirko Zorz In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in human behavior, decision-making, and responses to evolving cyber threats. Unveiling the interplay between red and blue teams, O’Reilly talks

React to this headline:

Loading spinner

Enhancing adversary simulations: Learn the business to attack the business Read More »

Demystifying SOC-as-a-Service (SOCaaS)

Demystifying SOC-as-a-Service (SOCaaS) 2024-02-07 at 06:31 By Help Net Security Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook breaches until ransomware attacks occur, this makes the threat actors’ job easy. It also underscores the urgency for proactive

React to this headline:

Loading spinner

Demystifying SOC-as-a-Service (SOCaaS) Read More »

DDoS attack power skyrockets to 1.6 Tbps

DDoS attack power skyrockets to 1.6 Tbps 2024-02-02 at 07:31 By Help Net Security DDoS attack trends for the second half of 2023 reveal alarming developments in their scale and sophistication, according to Gcore. The maximum attack power rose from 800 Gbps (1H 2023) to 1.6 Tbps. UDP floods continue to dominate, constituting 62% of

React to this headline:

Loading spinner

DDoS attack power skyrockets to 1.6 Tbps Read More »

45% of critical CVEs left unpatched in 2023

45% of critical CVEs left unpatched in 2023 2024-01-25 at 06:01 By Help Net Security Global attack attempts more than doubled in 2023, increasing 104%, according to Armis. Blind spots and critical vulnerabilities are worsening, with 45% of critical CVEs remaining unpatched. Utilities (over 200% increase) and manufacturing (165% increase) were the most at risk

React to this headline:

Loading spinner

45% of critical CVEs left unpatched in 2023 Read More »

New method to safeguard against mobile account takeovers

New method to safeguard against mobile account takeovers 2024-01-22 at 13:01 By Help Net Security Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains unauthorized access to online accounts. Most mobiles are now home to a complex ecosystem of interconnected

React to this headline:

Loading spinner

New method to safeguard against mobile account takeovers Read More »

Ransomware negotiation: When cybersecurity meets crisis management

Ransomware negotiation: When cybersecurity meets crisis management 2024-01-18 at 07:01 By Mirko Zorz In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do, when to do it, who is notified, who will

React to this headline:

Loading spinner

Ransomware negotiation: When cybersecurity meets crisis management Read More »

3 ways to combat rising OAuth SaaS attacks

3 ways to combat rising OAuth SaaS attacks 2024-01-16 at 07:31 By Help Net Security OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam activity using the

React to this headline:

Loading spinner

3 ways to combat rising OAuth SaaS attacks Read More »

Emerging cybersecurity trends and expectations for 2024

Emerging cybersecurity trends and expectations for 2024 2024-01-03 at 07:31 By Help Net Security In this Help Net Security video, John Dwyer, Head of Research at IBM X-Force, discusses how 2024 is poised to be an incredibly impactful year for cyber attacks, driven by world events and access to advanced technologies like AI. The post

React to this headline:

Loading spinner

Emerging cybersecurity trends and expectations for 2024 Read More »

Hackers employ nuanced tactics to evade detection

Hackers employ nuanced tactics to evade detection 2024-01-02 at 07:01 By Help Net Security Threat actors evolved tactics, opting for a more nuanced approach that spread attacks across a broader timeframe to blend in with legitimate traffic and evade detection during peak holiday shopping times, according to Cequence Security. 2023 holiday season unveiled alarming realities

React to this headline:

Loading spinner

Hackers employ nuanced tactics to evade detection Read More »

Supply chain emerges as major vector in escalating automotive cyberattacks

Supply chain emerges as major vector in escalating automotive cyberattacks 20/12/2023 at 08:05 By Help Net Security In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion. These attacks mainly targeted automotive suppliers, not

React to this headline:

Loading spinner

Supply chain emerges as major vector in escalating automotive cyberattacks Read More »

Fortifying cyber defenses: A proactive approach to ransomware resilience

Fortifying cyber defenses: A proactive approach to ransomware resilience 15/12/2023 at 08:02 By Help Net Security Ransomware has become a pervasive threat, compromising the security and functionality of vital systems across the United States. While governmental pledges and public declarations of intent to fight cybercrime are foundational, they often lack the immediate and tangible impact

React to this headline:

Loading spinner

Fortifying cyber defenses: A proactive approach to ransomware resilience Read More »

Digital ops and ops management security predictions for 2024

Digital ops and ops management security predictions for 2024 14/12/2023 at 08:32 By Help Net Security CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI at everyone’s mind. Instead of playing catch-up regarding the security of emerging tech like generative AI, organizations will prioritize

React to this headline:

Loading spinner

Digital ops and ops management security predictions for 2024 Read More »

Advanced ransomware campaigns expose need for AI-powered cyber defense

Advanced ransomware campaigns expose need for AI-powered cyber defense 05/12/2023 at 08:02 By Mirko Zorz In this Help Net Security interview, Carl Froggett, CIO at Deep Instinct, discusses emerging trends in ransomware attacks, emphasizing the need for businesses to use advanced AI technologies, such as deep learning (DL), for prevention rather than just detection and

React to this headline:

Loading spinner

Advanced ransomware campaigns expose need for AI-powered cyber defense Read More »

Organizations can’t ignore the surge in malicious web links

Organizations can’t ignore the surge in malicious web links 30/11/2023 at 07:02 By Help Net Security Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in

React to this headline:

Loading spinner

Organizations can’t ignore the surge in malicious web links Read More »

Cybercriminals turn to ready-made bots for quick attacks

Cybercriminals turn to ready-made bots for quick attacks 23/11/2023 at 08:31 By Help Net Security Bots and human fraud farms were responsible for billions of attacks in the H1 of 2023 and into Q3, according to Arkose Labs. These attacks comprised 73% of all website and app traffic measured. In other words, almost three-quarters of

React to this headline:

Loading spinner

Cybercriminals turn to ready-made bots for quick attacks Read More »

New horizons in cyber protection with 2024 trends to watch

New horizons in cyber protection with 2024 trends to watch 23/11/2023 at 08:02 By Help Net Security 2023 proved to be another challenging year for companies combating supply chain security and breaches. The 2024 outlook could be worse as attacks become increasingly sophisticated. In this Help Net Security video, Fei Huang, VP of Security Strategy

React to this headline:

Loading spinner

New horizons in cyber protection with 2024 trends to watch Read More »

Segmentation proves crucial for fast response to security incidents

Segmentation proves crucial for fast response to security incidents 21/11/2023 at 08:04 By Help Net Security In this Help Net Security video, Steve Winterfeld, Advisory CISO at Akamai, discusses the recent surge of ransomware attacks in the U.S. and how it relates to microsegmentation. Recovery after a security breach happens 11 hours faster with segmentation.

React to this headline:

Loading spinner

Segmentation proves crucial for fast response to security incidents Read More »

Scroll to Top