Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Nagios Core
Nagios: Open-source monitoring solution

Nagios is an open-source monitoring solution, now included as part of the robust Nagios Core Services Platform (CSP). It delivers end-to-end visibility across the entire IT …

data analytics
Your SOC is tired, AI isn’t

Security teams have discussed AI in the SOC for years, but solid evidence of its impact has been limited. A recent benchmark study by Dropzone puts measurable evidence behind …

Infosec products of the week
New infosec products of the week: October 10, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Object First, OPSWAT, Radiflow, and Semperis. OPSWAT’s MetaDefender Drive delivers …

data analytics
Six metrics policymakers need to track cyber resilience

Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to …

DefectDojo
DefectDojo: Open-source DevSecOps platform

DefectDojo is an open-source tool for DevSecOps, application security posture management (ASPM), and vulnerability management. It helps teams manage security testing, track …

world map
Cybersecurity’s next test: AI, quantum, and geopolitics

Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of …

cybersecurity jobs
Cybersecurity jobs available right now: October 7, 2025

Application Security / DevSecOps Engineer AvetixCyber | USA | Remote – View job details As an Application Security / DevSecOps Engineer, you will integrate security …

Proxmox
Proxmox Mail Gateway: Open-source email security solution reaches version 9.0

First released in 2005, the open-source Proxmox Mail Gateway has become a widely adopted mail proxy, positioned between the firewall and the internal mail server to stop …

key
Old authentication habits die hard

Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and policy gaps 40% of …

cyber attacks
Phishing is old, but AI just gave it new life

The volume of cyberattacks has reached staggering levels, with new tactics that blur the line between legitimate and malicious activity. A new threat report from Comcast, …

keys
Passkeys rise, but scams still hit hard in 2025

Americans are dealing with a growing wave of digital scams, and many are losing money in the process. According to the fourth annual Consumer Cyber Readiness Report, nearly …

AI
AI hype hits a wall when the data doesn’t deliver

Companies are pouring money into AI for IT operations, but most projects are still far from maturity. A global survey of 1,200 business leaders, IT leaders, and technical …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools