Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
strategy
Invisible IT is becoming the next workplace priority

IT leaders want their employees to work without running into digital hurdles, but many still struggle with fragmented systems that slow teams down. A new report from Lenovo …

CISO
CISOs are spending big and still losing ground

Security leaders are entering another budget cycle with more money to work with, but many still feel no safer. A new benchmark study from Wiz shows a widening gap between …

visualization
Building the missing layers for an internet of agents

Cybersecurity teams are starting to think about how large language model agents might interact at scale. A new paper from Cisco Research argues that the current network stack …

user
Data brokers are exposing medical professionals, and turning their personal lives into open files

Large amounts of personal information about medical professionals are available on people search sites. A new analysis by Incogni’s researchers shows how much data about …

Infosec products of the week
New infosec products of the week: December 5, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BlackFog, Datadog, Forward Edge-AI, SandboxAQ, and Upwind. BlackFog releases ADX …

quantum computing
The quantum clock is ticking and businesses are still stuck in prep mode

Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens when that moment arrives. A new report …

Portmaster
Portmaster: Open-source application firewall

Portmaster is a free and open source application firewall built to monitor and control network activity on Windows and Linux. The project is developed in the EU and is …

botnet
CISOs are questioning what a crisis framework should look like

CISOs increasingly assume the next breach is coming. What concerns them most is whether their teams will understand the incident quickly enough to limit the fallout. A recent …

world
Threat intelligence programs are broken, here is how to fix them

Security teams often gather large amounts of threat data but still struggle to improve detection or response. Analysts work through long lists of alerts, leaders get unclear …

AI
Attackers keep finding new ways to fool AI

AI development keeps accelerating while the safeguards around it move on uneven ground, according to The International AI Safety Report. Security leaders are being asked to …

authentication
The collapse of trust at the identity layer

Identity verification has become the latest front in the fight against industrialized fraud, according to a new report from Regula. The shift is visible across sectors that …

cybersecurity jobs
Cybersecurity jobs available right now: December 2, 2025

Application Security Manager Oddity | Israel | On-site – View job details As an Application Security Manager, you will conduct threat modeling based on a deep …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools