Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
risk management
Why organizations need a new approach to risk management

To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business …

human risk
CISOs, stop chasing vulnerabilities and start managing human risk

Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent …

Signal backup
Signal adds secure backup option for chat history

Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The …

artificial intelligence
Employees keep feeding AI tools secrets they can’t take back

Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are …

cybersecurity jobs
Cybersecurity jobs available right now: September 9, 2025

Analyst, Cybersecurity DFIR ICE | Singapore | On-site – No longer accepting applications As an Analyst, Cybersecurity DFIR, you will review and triage user-reported …

identity
Identity management was hard, AI made it harder

Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven …

Brain
AI moves fast, but data security must move faster

Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and …

visualization
File security risks rise as insiders, malware, and AI challenges converge

Breaches tied to file access are happening often, and the costs add up quickly. Many organizations have faced multiple file-related incidents over the last two years, with …

botnet
New threat group uses custom tools to hijack search results

ESET Research has identified a new threat group called GhostRedirector. In June 2025, this group broke into at least 65 Windows servers, mostly in Brazil, Thailand, Vietnam, …

identity
Complexity and AI put identity protection to the test

Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity from “a tactical IT …

cybersecurity jobs
Cybersecurity jobs available right now: September 2, 2025

CISO Shift Technology | France | Remote – No longer accepting applications As a CISO, you will develop and execute a comprehensive enterprise information security …

lock
Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study offers evidence on which measures are most closely …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools