Help Net Security
The challenges of tracking APT attacks
Advanced persistent threats (APT) are a type of attack that’s usually carried out or sponsored by a nation-state, and unlike other types of malware attacks, these pose …
Cybersecurity implications of using public cloud platforms
According to a recent Node4 report, IT managers have a generally positive view of public cloud platforms. Half of the respondents said that, despite benefits, they have had to …
ODD Platform: Open-source data discovery and observability
Provectus released v0.8 of its Open Data Discovery Platform (ODDP), an open-source platform that helps data-driven enterprises democratize their data. Designed to overcome the …
PCI SSC publishes new standard for mobile payment acceptance solutions
The PCI Security Standards Council (PCI SSC) published a new standard designed to support the evolution of mobile payment acceptance solutions. PCI Mobile Payments on COTS …
Transportation sector targeted by both ransomware and APTs
Trellix released The Threat Report: Fall 2022 from its Advanced Research Center, which analyzes cybersecurity trends from the third quarter (Q3) of 2022. The report includes …
Photos: Cybertech NYC 2022, part 2
Cybertech NYC 2022 is talking place at the Javits Center in New York. Here’s a closer look at this event, which focuses on innovation and the future of cyber. Browse our first …
Cybertech NYC 2022 video walkthrough
Help Net Security is in New York City this week for Cybertech NYC 2022 at the Javits Center. This event, which focuses on innovation and the future of cyber, brings together …
Photos: Cybertech NYC 2022
Help Net Security is in New York City at the Javits Center this week for Cybertech NYC 2022. Here’s a closer look at this event, which focuses on innovation and the …
Why companies can no longer hide keys under the doormat
For good reason, companies trust in encryption, blockchain, zero trust access, distributed or multi-party strategies, and other core technologies. At the same time, companies …
Top security priorities for 2023
In this Help Net Security video, Rodman Ramezanian, Cloud Threat Lead at Skyhigh Security, talks about what we can expect in 2023 security wise. Humans will continue to be in …
Robotic Process Automation (RPA) adoption hindered by security concerns
Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous …
Top passwords used in RDP brute-force attacks
Specops Software released a research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. This analysis coincides with the latest …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims