Help Net Security

Top enterprise email threats and how to counter them
A research from Tessian, the State of Email Security Report, found that enterprise email is now the No. 1 threat vector for cyberattacks. According to the report, 94% of …

Product showcase: ESET’s newest consumer offerings
It’s no secret that antivirus software is as essential to your computer as a power cord. However, the threats don’t stop at your devices. For example, criminals that are …

The psychological fallout of a ransomware crisis
Northwave has conducted scientific research into the psychological fallout of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks …

Key cybersecurity trends in the energy sector
The key trends for the energy industry are about how we manage the future supply and demand challenges at a much more granular level than we are currently able to do. If …

5 Kali Linux tools you should learn how to use
Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. …

Unwanted emails steadily creeping into inboxes
A research from Hornetsecurity has revealed that 40.5% of work emails are unwanted. The Cyber Security Report 2023, which analysed more than 25 billion work emails, also …

Week in review: Microsoft fixes many zero-days, malicious droppers on Google Play, IRISSCON 2022
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Taking cybersecurity investments to the next level In this Help Net Security …

Online payment fraud is evolving
E-commerce fraud is expected to cost merchants in excess of US$48 billion globally in 2023, up from over $41 billion in 2022 according to Juniper Research. It predicted that …

How can CISOs catch up with the security demands of their ever-growing networks?
Vulnerability management has always been as much art as science. However, the rapid changes in both IT networks and the external threat landscape over the last decade have …

Balance reliable online age verification methods with data protection issues
Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable …

Personal cybersecurity is now a company problem
As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the …

API abuses and attacks create new challenges for retailers
Imperva releases The State of Security Within eCommerce 2022 report, a 12-month analysis by Imperva Threat Research of cybersecurity threats targeting the retail industry. …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)