attacks

APTs use of lesser-known TTPs are no less of a headache

APTs use of lesser-known TTPs are no less of a headache 14/08/2023 at 08:32 By Help Net Security APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against small- and medium-sized businesses has increased significantly. Everyone is fair game, and […]

React to this headline:

Loading spinner

APTs use of lesser-known TTPs are no less of a headache Read More »

Bridging the cybersecurity skills gap through cyber range training

Bridging the cybersecurity skills gap through cyber range training 24/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Debbie Gordon, CEO of Cloud Range explains the concept of a cyber range, its crucial role in preparing for real-world cyber threats, and the importance of realism in cyber training scenarios. Gordon also discusses

React to this headline:

Loading spinner

Bridging the cybersecurity skills gap through cyber range training Read More »

Attackers intensify DDoS attacks with new tactics

Attackers intensify DDoS attacks with new tactics 21/07/2023 at 07:31 By Help Net Security As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of total attacks, while

React to this headline:

Loading spinner

Attackers intensify DDoS attacks with new tactics Read More »

67% of daily security alerts overwhelm SOC analysts

67% of daily security alerts overwhelm SOC analysts 20/07/2023 at 06:36 By Help Net Security Today’s security operations (SecOps) teams are tasked with protecting progressively sophisticated, fast-paced cyberattacks, according to Vectra AI. Yet, the complexity of people, processes, and technology at their disposal is making cyber defense increasingly unsustainable. The ever-expanding attack surface combined with

React to this headline:

Loading spinner

67% of daily security alerts overwhelm SOC analysts Read More »

Exploring the macro shifts in enterprise security

Exploring the macro shifts in enterprise security 20/07/2023 at 06:04 By Help Net Security The number of successful ransomware attacks and data breach attempts fell by 30% over the last year, the number of reported security incident types at organizations increased, according to the 2023 Cybersecurity Perspectives Survey by Scale. Security incident types In fact,

React to this headline:

Loading spinner

Exploring the macro shifts in enterprise security Read More »

Real-world examples of quantum-based attacks

Real-world examples of quantum-based attacks 17/07/2023 at 07:02 By Help Net Security Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from various sources in ways even beyond what we’ve experienced with AI. In this Help Net Security video, Tommaso

React to this headline:

Loading spinner

Real-world examples of quantum-based attacks Read More »

Satellites lack standard security mechanisms found in mobile phones and laptops

Satellites lack standard security mechanisms found in mobile phones and laptops 14/07/2023 at 07:34 By Help Net Security Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently orbiting the Earth from an IT perspective. Moritz Schloegel (left) and Johannes Willbold analyzed

React to this headline:

Loading spinner

Satellites lack standard security mechanisms found in mobile phones and laptops Read More »

20% of malware attacks bypass antivirus protection

20% of malware attacks bypass antivirus protection 13/07/2023 at 07:02 By Help Net Security Security leaders are concerned about attacks that leverage malware-exfiltrated authentication data, with 53% expressing extreme concern and less than 1% admitting they weren’t concerned at all, according to SpyCloud. However, many still lack the necessary tools to investigate the security and

React to this headline:

Loading spinner

20% of malware attacks bypass antivirus protection Read More »

CISO perspective on why Boards don’t fully grasp cyber attack risks

CISO perspective on why Boards don’t fully grasp cyber attack risks 11/07/2023 at 07:33 By Mirko Zorz Due to their distinct perspectives, Board members and CISOs often have differing views on cyber attack risks. The discrepancy arises when Boards need cybersecurity expertise, need help comprehending technical jargon, or when CISOs need to communicate in business

React to this headline:

Loading spinner

CISO perspective on why Boards don’t fully grasp cyber attack risks Read More »

Industry responses and strategies for navigating the tides of DDoS attacks

Industry responses and strategies for navigating the tides of DDoS attacks 11/07/2023 at 06:33 By Help Net Security It is important not to underestimate the potentially devastating impact of DDoS attacks. Organizations of all sizes should take proactive measures to mitigate and safeguard against DDoS attacks, ensuring the continuity and resilience of their operations. Throughout

React to this headline:

Loading spinner

Industry responses and strategies for navigating the tides of DDoS attacks Read More »

Number of email-based phishing attacks surges 464%

Number of email-based phishing attacks surges 464% 10/07/2023 at 06:45 By Help Net Security The evolving cyberattack landscape reveals the increasing utilization of generative artificial intelligence (AI) systems, like ChatGPT, by cybercriminals for crafting malicious content and executing sophisticated attacks, according to Acronis. The biannual threat report highlights ransomware as the dominant risk to small

React to this headline:

Loading spinner

Number of email-based phishing attacks surges 464% Read More »

Uncovering attacker tactics through cloud honeypots

Uncovering attacker tactics through cloud honeypots 26/06/2023 at 06:12 By Help Net Security Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in many cases, begin exploiting them almost instantly, highlighting the urgent need for comprehensive cloud security,

React to this headline:

Loading spinner

Uncovering attacker tactics through cloud honeypots Read More »

IT providers become go-to for cybersecurity advice

IT providers become go-to for cybersecurity advice 14/06/2023 at 06:31 By Help Net Security 61% of SMBs have been hit by a successful cyberattack in the last year, according to BlackFog. The research study, which examined the business impact of cybersecurity for organizations in the US and UK, also revealed the growing importance of engaging

React to this headline:

Loading spinner

IT providers become go-to for cybersecurity advice Read More »

Cyber extortion hits all-time high

Cyber extortion hits all-time high 12/06/2023 at 06:32 By Help Net Security Cyber extortion attacks have become increasingly prevalent in recent years, posing a significant threat to organizations of all sizes and industries, according to Orange Cyberdefense. Examining data from a total of 6,707 confirmed business victims, the findings show a fluctuation in the number

React to this headline:

Loading spinner

Cyber extortion hits all-time high Read More »

The evolution of DDoS attacks in 2023

The evolution of DDoS attacks in 2023 08/06/2023 at 07:10 By Help Net Security In this Help Net Security video, Mattias Fridström, Chief Evangelist at Arelion, talks about the DDoS threat landscape during 2023. DDoS attacks reflect significant geo-political challenges and social tensions and have become an increasingly important part of the hybrid warfare arsenal.

React to this headline:

Loading spinner

The evolution of DDoS attacks in 2023 Read More »

How defense contractors can move from cybersecurity to cyber resilience

How defense contractors can move from cybersecurity to cyber resilience 02/06/2023 at 07:42 By Help Net Security As the world’s most powerful military and economic power, the United States also holds another, less impressive distinction: Cyber threat actors target the US more than any other country in the world. In 2022 alone, the FBI received

React to this headline:

Loading spinner

How defense contractors can move from cybersecurity to cyber resilience Read More »

Organizations spend 100 hours battling post-delivery email threats

Organizations spend 100 hours battling post-delivery email threats 30/05/2023 at 06:11 By Help Net Security Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections, stolen data, and reputational damage, according to Barracuda Networks. Barracuda Networks research finds 24% of organizations studied had at least

React to this headline:

Loading spinner

Organizations spend 100 hours battling post-delivery email threats Read More »

Company size doesn’t matter when it comes to cyberattacks

Company size doesn’t matter when it comes to cyberattacks 29/05/2023 at 06:34 By Help Net Security 65% of organizations in the enterprise sector suffered a cyberattack within the last 12 months, which is similar to the results among companies of all sizes (68%), according to Netwrix. Larger organizations are a more frequent target for cyberattacks

React to this headline:

Loading spinner

Company size doesn’t matter when it comes to cyberattacks Read More »

Threat actors exploit new channels for advanced phishing attacks

Threat actors exploit new channels for advanced phishing attacks 26/05/2023 at 07:36 By Help Net Security Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of attacks increased by 87%, highlighting the growing threat that cyber attacks now pose

React to this headline:

Loading spinner

Threat actors exploit new channels for advanced phishing attacks Read More »

Cybercriminals masquerading as MFA vendors

Cybercriminals masquerading as MFA vendors 26/05/2023 at 07:20 By Help Net Security Cybercriminals are increasingly posing as multi-factor authentication vendors and small businesses are becoming more popular targets, according to VIPRE. Attachment-based malspam is on the rise Financial institutions (48%) are still the most targeted sector by a wide margin. Insider attacks now take on

React to this headline:

Loading spinner

Cybercriminals masquerading as MFA vendors Read More »

Scroll to Top