threat

Is your identity safe? Exploring the gaps in threat protection

Is your identity safe? Exploring the gaps in threat protection 27/09/2023 at 07:01 By Help Net Security A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such as MFA and PAM, have notable limitations that can lead to the exploitation of stolen credentials. […]

React to this headline:

Loading spinner

Is your identity safe? Exploring the gaps in threat protection Read More »

Cybersecurity skills employers are desperate to find in 2023

Cybersecurity skills employers are desperate to find in 2023 26/09/2023 at 07:01 By Help Net Security The surge in digital economic growth and our increasing dependence on it make cybersecurity a critical profession. In this Help Net Security video, Aaron Rosenmund, Director of Security Research and Curriculum, Pluralsight, discusses the most sought-after cybersecurity skills in

React to this headline:

Loading spinner

Cybersecurity skills employers are desperate to find in 2023 Read More »

Ransomware attacks go beyond just data

Ransomware attacks go beyond just data 04/09/2023 at 07:01 By Help Net Security 65% of organizations confirmed that ransomware is one of the top three threats to their viability, and for 13%, it is the biggest threat, according to a report by Enterprise Strategy Group (ESG) and Keepit. Organizations’ strategies against ransomware According to the

React to this headline:

Loading spinner

Ransomware attacks go beyond just data Read More »

RaaS proliferation: 14 new ransomware groups target organizations worldwide

RaaS proliferation: 14 new ransomware groups target organizations worldwide 25/07/2023 at 06:00 By Help Net Security In the Q2 2023, GuidePoint Research and Intelligence Team (GRIT) tracked 1,177 total publicly posted ransomware victims claimed by 41 different threat groups. The most impacted industries GRIT’s report shows a 38% increase in public ransomware victims compared to

React to this headline:

Loading spinner

RaaS proliferation: 14 new ransomware groups target organizations worldwide Read More »

Fileless attacks increase 1,400%

Fileless attacks increase 1,400% 04/07/2023 at 07:11 By Help Net Security Aggregated honeypot data, over a six-month period, showed that more than 50% of the attacks focused on defense evasion, according to Aqua Security. Threat actors avoid detection These attacks included masquerading techniques, such as files executed from /tmp, and obfuscated files or information, such

React to this headline:

Loading spinner

Fileless attacks increase 1,400% Read More »

The evolution of DDoS attacks in 2023

The evolution of DDoS attacks in 2023 08/06/2023 at 07:10 By Help Net Security In this Help Net Security video, Mattias Fridström, Chief Evangelist at Arelion, talks about the DDoS threat landscape during 2023. DDoS attacks reflect significant geo-political challenges and social tensions and have become an increasingly important part of the hybrid warfare arsenal.

React to this headline:

Loading spinner

The evolution of DDoS attacks in 2023 Read More »

Verizon 2023 Data Breach Investigations Report: 74% of breaches involve human element

Verizon 2023 Data Breach Investigations Report: 74% of breaches involve human element 06/06/2023 at 16:01 By Help Net Security Verizon Business today released the results of its 16th annual Data Breach Investigations Report (2023 DBIR), which analyzed 16,312 security incidents and 5,199 breaches. Chief among its findings is the soaring cost of ransomware – malicious

React to this headline:

Loading spinner

Verizon 2023 Data Breach Investigations Report: 74% of breaches involve human element Read More »

Cybercriminals use legitimate websites to obfuscate malicious payloads

Cybercriminals use legitimate websites to obfuscate malicious payloads 02/06/2023 at 06:33 By Help Net Security According to Egress, the evolving attack methodologies currently used by cybercriminals are designed to get through traditional perimeter security. “The evolution of phishing emails continues to pose a major threat to organizations, emphasizing the need to enhance defenses to prevent

React to this headline:

Loading spinner

Cybercriminals use legitimate websites to obfuscate malicious payloads Read More »

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers! 01/06/2023 at 18:18 By Zeljka Zorz A critical zero-day vulnerability in Progress Software’s enterprise managed file transfer solution MOVEit Transfer is being exploited by attackers to grab corporate data. “[The vulnerability] could lead to escalated privileges and potential unauthorized access to the environment,” the company warned

React to this headline:

Loading spinner

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers! Read More »

Preparing for federal supply chain security standardization

Preparing for federal supply chain security standardization 17/05/2023 at 09:42 By Help Net Security In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the ultimate objective of standardizing security requirements across the Department of Defense (DoD) and the Federal Civilian Executive

React to this headline:

Loading spinner

Preparing for federal supply chain security standardization Read More »

Is human threat hunting a fool’s errand?

Is human threat hunting a fool’s errand? 15/05/2023 at 12:11 By Help Net Security We all have witnessed automated advances creep into our modern threat hunting processes – and with good reason. As the rate of cyberattacks steadily increases, automated threat hunting processes are being integrated to help stem the tide by providing quicker security

React to this headline:

Loading spinner

Is human threat hunting a fool’s errand? Read More »

Scroll to Top