Help Net Security

Week in review: Rackspace outage, Kali Linux 2022.4 released, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Rackspace Hosted Exchange outage was caused by ransomware Rackspace has …

December 2022 Patch Tuesday forecast: Fine-tuning the connectivity
Microsoft wrapped up a lot of ‘loose ends’ last month with their November set of updates, but there is still some work to do before the end-of-year holiday season. The …

New infosec products of the week: December 9, 2022
Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Arkose Labs, Kudelski Security, Lepide, OPSWAT, Palo Alto Networks, and …

Research reveals where 95% of open source vulnerabilities lie
New research from Endor Labs offers a view into the rampant but often unmonitored use of existing open-source software in application development and the dangers arising from …

Insights into insider threats: Detecting and monitoring abnormal user activity
A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever …

PCI Secure Software Standard 1.2 released
PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard …

Why automation is critical for scaling security and compliance
As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep …

Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …

Data protection and security in 2023
Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is that …

Cybercriminals are scamming each other, tipping off law enforcement
Cybercriminals are scamming each other out of millions of dollars and use arbitration to settle disputes about the scams, according to Sophos. For this report, Sophos experts …

How IoT is changing the threat landscape for businesses
Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production …

Consumers prioritize mobile app security over features
Appdome unveiled the results of a global survey that shares the views of 25,000 consumers in 11 countries on mobile app use and consumer expectations of mobile app security. …
Featured news
Resources
Don't miss
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
- Using lightweight LLMs to cut incident response times and reduce hallucinations
- Fractional vs. full-time CISO: Finding the right fit for your company
- Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
- Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)