Help Net Security
Microsoft to release seven bulletins next week
It is the beginning of March and Microsoft just published the Advance Notice for this month’s Patch Tuesday. We will get seven bulletins next week, affecting all …
The SCADA security challenge
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …
Abrupt drop in Symbian malware
In what may be the only good news for Symbian, F-Secure’s latest Mobile Threat Report shows a drop in malware targeting the declining platform to just four percent of …
SolarWinds Alert Central: Free tool for managing IT alerts
SolarWinds announced a first full-featured yet free product, SolarWinds Alert Central. IT pros can now centralize multi-system IT alerts in a single, consolidated view, give …
99 percent of web apps vulnerable to attack
A new Cenzic report demonstrates that the overwhelming presence of web application vulnerabilities remains a constant problem, with an astounding 99 percent of applications …
Identity theft on the rise this tax season
The threat of identity theft this tax season leaves consumers with more to worry about than whether or not a tax return is in the mail. A thief may use sensitive information, …
The Chinese time bomb
At Seculert, when we analyze a targeted attack, we are trying to help our customers understand the intention of the attackers, as we look how the attack evolves over time. In …
Static analysis tool for examining binaries
GrammaTech announced a static-analysis tool for analyzing binary libraries and executables. CodeSonar for Binaries enables users to examine software for security …
Dell SecureWorks expands incident response services
Dell SecureWorks is expanding its incident response (IR) services to counter the growing severity and frequency of breaches. Many organizations aren’t equipped …
Enterprise security for businesses addressing privacy obstacles
Protegrity announced deeper enterprise security for global businesses addressing privacy obstacles such as cross-border data transfer and industry specific regulatory …
Longline phishing attacks rely on mass customization
Proofpoint released a wide-ranging study that identified a new class of sophisticated and effective, large-scale phishing attack dubbed “longlining”. Longlining, …
Older MiniDuke strain found, raises questions about its origins
A version of MiniDuke – the cyberspy malware aimed at governments and agencies in Europe and elsewhere – has been operating for at least 21 months, internet …
Featured news
Resources
Don't miss
- CERT UEFI Parser: Open-source tool exposes UEFI architecture to uncover vulnerabilities
- Why prevention-first secrets security will define enterprise scale: Learnings from a leading telecom
- Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)
- Attackers use Windows App-V scripts to slip infostealer past enterprise defenses
- Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)