Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
California Air Tools compressor
Chain of security weaknesses found in smart air compressor model

Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience …

The Wireless Cookbook
Review: The Wireless Cookbook

The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who …

third party
How to stop third-party risk from becoming your biggest headache

In this Help Net Security video, Robert Kraczek, Global IAM Strategist at One Identity, takes a deep dive into the growing problem of third-party cyber exposure and what it …

cybersecurity jobs
Cybersecurity jobs available right now: October 28, 2025

Analyst, Cybersecurity Threat Intelligence Brookfield Renewable | Canada | On-site – View job details As a Cybersecurity Threat Intelligence Analyst, you will run …

Help Net Security
Zumigo enhances fraud prevention with low-code tools and passwordless authentication

Zumigo has upgraded its solutions designed to help businesses fortify their defenses against rising sophisticated consumer fraud with an identity-first security approach. …

Help Net Security
Albireo PCS delivers secure, managed cloud alternative to on-premise servers

Albireo Energy launched Private Cloud Services (PCS), a secure, fully managed cloud service designed to host and protect Building Automation System (BAS) and Energy Power …

Help Net Security
Jumio introduces selfie.DONE to simplify digital identity verification

Jumio announced the launch of selfie.DONE, a new solution that delivers on the company’s vision for true reusable identity. selfie.DONE empowers trusted users to be instantly …

eBook: A quarter century of Active Directory
eBook: A quarter century of Active Directory

Active Directory (AD) remains the backbone of enterprise identity and a prime target for attackers. Explore its 25-year history, evolving risks, and how organizations can …

ransomware
Ransomware, extortion groups adapt as payment rates reach historic lows

Ransomware groups are facing an economic downturn of their own: In Q3 2025, only 23 percent of victims paid a ransom, and for data theft incidents that involved no encryption, …

United Nations
72 states sign first global UN Convention against Cybercrime

The world’s first global convention to prevent and respond to cybercrime opened for signature today in Hanoi, Vietnam, and will remain open at United Nations Headquarters in …

earbud
Can your earbuds recognize you? Researchers are working on it

Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step could be inside the ear. New research explores …

Dependency-Track
Dependency-Track: Open-source component analysis platform

Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools