June 6, 2023
Via: Help Net SecurityVerizon Business today released the results of its 16th annual Data Breach Investigations Report (2023 DBIR), which analyzed 16,312 security incidents and 5,199 breaches. Chief among its findings is the soaring cost of ransomware – malicious software (malware) that encrypts […]
March 3, 2022
Via: Help Net SecurityNow more than ever, life happens online. But, with greater connectedness comes enhanced risk. Millions of Americans fall victim to identity theft and fraud each year, resulting in billions of dollars in losses. “In today’s digitally connected world, cyber fraud […]
Threats & Malware, Virus & Malware
February 25, 2022
Via: Help Net SecurityA CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation tactics and the operational impact of incidents. Eighty percent of companies surveyed have experienced […]
August 11, 2021
Via: Help Net SecurityOrganizations have become more security conscious over the course of the pandemic, leading them to invest heavily in zero trust, according to a study from identity firm Okta. The report surveyed over 600 global security leaders about their initiatives and […]
Threats & Malware, Virus & Malware
July 21, 2021
Via: Help Net SecurityTraditional ransomware defenses are failing, with 54% of all victims having anti-phishing training and 49% having perimeter defenses in place at the time of attack, according to a Claudian survey of 200 IT decision makers whose organizations experienced a ransomware […]
March 9, 2021
Via: Help Net SecurityThe onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased pressure from the board around the security of their organization. These findings highlight an increased concern over […]
May 19, 2020
Via: Help Net SecurityVerizon has released its annual Data Breach Investigations Report (DBIR), which offers an overview of the cyber security incidents and data breaches that happened in/were discovered in the past year. Based on an analysis of incident and breach reports by […]
May 7, 2020
Via: Help Net SecurityNearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, two years after the inventor of the complex static […]
Threats & Malware, Vulnerabilities
February 6, 2020
Via: Help Net SecurityWhich ten software vulnerabilities should you patch as soon as possible (if you haven’t already)? Recorded Future researchers have analyzed code repositories, underground forum postings, dark web sites, closed source reports and data sets comprising of submissions to popular malware […]
November 29, 2019
Via: Security AffairsA confidential report published by the Dutch National Cyber Security Centre (NCSC) revealed that at least 1,800 companies are affected by three strains of ransomware across the world. According to the report, the three ransomware LockerGoga, MegaCortex, and Ryuk) involved […]
Mobile, Network security, Privacy protection
November 1, 2019
Via: The HillOfficials in several countries have reportedly been targeted in a hack affecting the messaging app WhatsApp. Reuters reported Friday, citing people familiar with an investigation into the matter, that senior officials were targeted through WhatApp, by a hacking software that […]
October 30, 2019
Via: Help Net SecurityThe cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent Beaming report, UK businesses faced cyberattacks every 50 seconds in the […]
October 11, 2019
Via: Hot for SecurityA European Union report assessing risks to its planned 5G cybersecurity networks says that foreign states and state-backed actors represent the biggest threat, and it all but named Chinese firm Huawei as one such risk. Huawei started developing 5G infrastructure […]
October 10, 2019
Via: The HillDemocrats are renewing their calls for Senate action on election security measures following the release of a Senate Intelligence Committee report that found the Kremlin directed Russian efforts to interfere in the 2016 presidential election. The party has repeatedly gone […]
August 30, 2019
Via: Help Net SecurityTrend Micro published its roundup report for the first half of 2019, revealing a surge in fileless attacks designed to disguise malicious activity. Detections of this threat alone were up 265% compared to the first half of 2018. “Sophistication and […]
Mobile security, Vulnerabilities
August 30, 2019
Via: Security WeekGoogle announced on Thursday the launch of a new reward program for data abuse, and the expansion of the Google Play bounty program to include Android applications with over 100 million installs. The Google Play Security Reward Program (GPSRP) now […]
August 13, 2019
Via: The HillAt least eight states are on course to not use any form of paper ballots or machines with paper records during the 2020 elections, a report published Tuesday by New York University’s Brennan Center for Justice found. The report said […]
June 21, 2019
Via: The HillCalifornia has suffered more data breaches and personal records exposed than any other state in the U.S. over the past decade, with almost 1,500 data breach incidents, a new report has found. The report, published Thursday by consumer group Comparitech, […]
April 18, 2019
Via: Help Net SecurityEndpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the probability of failure and decay, in turn, exposing […]
January 10, 2019
Via: Dark ReadingThe total number of vulnerabilities in Web applications reported by researchers jumped to 17,142 in 2018, climbing more than 21% compared to the previous year and driven in part by the large number of flaws found in Web applications and […]