Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
LogicHub launches MDR+ to provide flexible end-to-end detection and response

LogicHub, the provider of the industry’s most complete security automation solution, unveiled MDR+, its automation-driven Managed Detection and Response (MDR) solution. …

Enea Unified Data Manager: A cloud-native network function for 4G and 5G data management

Enea launched the Enea Unified Data Manager, a hardware-agnostic, cloud-native network function for 4G and 5G data management. The software performs the 3GPP functions of …

Keysight and Samsung collaborate to accelerate mobile operators’ deployment of 5G services

Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced …

Sysnet secures funding to support growth and accelerate development of security product offerings

Sysnet Global Solutions, the leading provider of cyber security and compliance solutions operating in over 60 countries worldwide, announced it has secured a significant …

Nexthink appoints new CTO, two additional board members, and a new Chairman

Nexthink, the leader in digital experience management software, announced the appointment of a new Chief Technology Officer, two additional board members and a new Chairman to …

Michel Robert joins Epsilon as Group Chief Executive Officer

Epsilon, a global connectivity and communications service provider, has appointed Michel Robert as its Group Chief Executive Officer, with immediate effect. Bringing more than …

biohazard
Emotet can spread to poorly secured Wi-Fi networks and computers on them

Here’s yet another reason to secure Wi-Fi networks and Windows user accounts with a strong enough password: researchers have spotted and analyzed a malware program that …

honeypot
Honware: IoT honeypot for detecting zero-day exploits

Two researchers have created a solution that could help security researchers and IoT manufacturers with detecting zero-day exploits targeting internet-connected devices more …

shark
Which vulnerabilities were most exploited by cybercriminals in 2019?

Which ten software vulnerabilities should you patch as soon as possible (if you haven’t already)? Table of top exploited CVEs between 2016 and 2019 (repeats are noted by …

zero
The Goldilocks principle for zero trust fraud prevention

According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at …

bomb
Cyberattackers decreased their activity at the end of 2019, but only to change tactics

Attackers know that humans are still the weakest link. Across the board, malicious cyber-activity was down partly as a result of hectic holiday schedules and vacations with …

IoT
How IoT devices open a portal for chaos across the network

Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools