Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Morgan Wright
Future trends in cyber warfare: Predictions for AI integration and space-based operations

In this Help Net Security interview, Morgan Wright, Chief Security Advisor at SentinelOne, discusses how AI is utilized in modern cyber warfare by state and non-state actors. …

healthcare cybersecurity
B+ security rating masks healthcare supply chain risks

While the healthcare sector gets a “B+” security rating for the first half of 2024, it faces a critical vulnerability: supply chain cyber risk, according to SecurityScorecard. …

Progress MOVEit
Progress quietly fixes MOVEit auth bypass flaws (CVE-2024-5805, CVE-2024-5806)

Progress Software has patched one critical (CVE-2024-5805) and one high-risk (CVE-2024-5806) vulnerability in MOVEit, its widely used managed file transfer (MFT) software …

HNS
eSentire introduces MDR for GenAI Visibility

Leveraging security telemetry across an organization’s log and network data sources, eSentire’s MDR for GenAI Visibility solution provides daily insights into an …

LockBit
Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach

Ransomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the operations of 200+ Indonesian …

SnailLoad
New security loophole allows spying on internet users’ online activity

Researchers at Graz University of Technology were able to spy on users’ online activities simply by monitoring fluctuations in the speed of their internet connection. …

Zeek
Zeek: Open-source network traffic analysis, security monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a …

Kunal Modasiya
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative …

cybersecurity funding activity
Breaking down the numbers: Q2 2024 cybersecurity funding activity recap

We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea April | $20 million Alethea closed a $20 …

Guide to mitigating credential stuffing attacks
Guide to mitigating credential stuffing attacks

We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the news today, many statistics revolve around the …

HNS
Provenir’s AI-powered risk decisioning platform increases fraud detection

As the financial services world becomes increasingly digitized and consumer demands evolve, fraudsters and their methods are becoming more sophisticated. Provenir is helping …

Android
Open-source Rafel RAT steals info, locks Android devices, asks for ransom

The open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to lock them, encrypt their contents, and demand money …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools