Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Josh Corman and Rob Arnold join CISA to support COVID-19 response efforts

The Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of two leading cybersecurity experts to support the agency’s COVID-19 response efforts. Josh …

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

Twilio has confirmed that, for 8 or so hours on July 19, a malicious version of their TaskRouter JS SDK was being served from one of their AWS S3 buckets. “Due to a …

REMnux
REMnux toolkit for malware analysis version 7 released

REMnux is a popular Linux-based toolkit for reverse-engineering malicious software which malware analysts have been relying on for more than 10 years to help them quickly …

dark
How do cybercriminals secure cybercrime?

Trend Micro unveiled new insights analyzing the market for underground hosting services and detailing how and where cybercriminals rent the infrastructure that hosts their …

person
Closing the skills gap can minimize the business impact of cyberattacks

CISOs who are successful at reducing or closing the critical skills gap have the highest probability of minimizing the business impact of cyberattacks – even when budgets and …

identity theft
Organizations with poor privacy practices 80% more likely to suffer data breach

There’s a predictive relationship between responsible privacy practices and security outcomes, according to Osano. Companies with inadequate data privacy practices are …

stop
Human error: Understand the mistakes that weaken cybersecurity

43% of US and UK employees have made mistakes resulting in cybersecurity repercussions for themselves or their company, according to a Tessian report. With human error being a …

magnifying glass
Deep Packet Inspection challenges for telecom and security vendors

Enea announced the results of the first survey about deep packet inspection (DPI) challenges, conducted among high-tech product managers. The goal of the survey is to better …

(ISC)² training
There’s CISSP training, then there’s official CISSP training

The CISSP is the most highly regarded certification in the cybersecurity industry, so it isn’t surprising that countless training companies offer CISSP exam prep. But you …

Tanium unveils Tanium as a Service to help manage and secure devices in a remote work world

Tanium announced Tanium as a Service, a zero infrastructure endpoint management and security platform. Tanium as a Service optimizes Tanium’s patented architecture to quickly …

BDO launches integrated data governance, risk management and compliance solution

BDO USA announced the launch of a new integrated solution that helps organizations develop and maintain a comprehensive data governance, risk management and compliance …

G-71 unveils LeaksID, a cloud-based IT solution that protects valuable data from leakage

G-71 launched a cloud-based IT solution with proprietary technology at its core that protects valuable data from leakage through screenshots, pictures of the screen, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools