Help Net Security
Video: Antivirus evasion techniques
This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …
CipherCloud delivers searchable strong encryption
CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …
Real-time operational risk and compliance monitoring
Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all …
Video: DIY Command & Control for fun and no profit
Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …
Best practices for threat management
With threats of all types on the rise and increasing costs of security breaches growing (analyst approximate $840,000 per breach), enterprises are investing in numerous threat …
Internet sites “fingerprint” users by secretly collecting browser info
A group of European researchers have released the results of their research into just how many of the most visited Internet websites track users without their knowledge with …
Week in review: Dangerous vBulletin exploit in the wild, Blackhole exploit kit creator arrested
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: How to establish trust in the cloud In order to enforce corporate …
Infographic: The nightmare of securing unstructured data
This infographic from SealPath comes with data and facts of data loss in enterprises: sources of data breaches, market trends, technologies related to data protection, etc. …
Tamper-resistant jailbreak detection from Arxan
Arxan announced new tamper-proof jailbreak detection security and environmental sensing technology. In addition to Arxan’s pre-existing Guards, which are running on over …
Yara rules for leaked KINS toolkit
Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank …
Video: Stop making excuses, it’s time to own your high impact vulnerabilities
Most systems are insecure, not because we don’t know about or understand the vulnerability but because we fail at planning and communicating the solution to address or …
New approach for real-time security incident response
NetCitadel announced a new analytics-driven, context aware approach for protecting enterprise networks from increasingly sophisticated security attacks and APTs. The evolution …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month