Help Net Security

Whitepaper: Shared responsibility model for cloud security
With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources …

IDC Analyst Brief reveals how passwords aren’t going away
Passwords are the keys to the kingdom. Hardening the password security layer requires a multistep approach. img …

Following Log4j: Supporting the developer community to secure IT
How bad was the Log4j vulnerability for open source’s reputation? One of the most high-profile exploits in recent years, it even led to a government advisory from the UK’s …

Most missed area of zero trust: Unmanageable applications
In this Help Net Security video, Matthew Chiodi, Chief Trust Officer of Cerby, talks about the likely hole in your security strategy. This video zeroes in on one of the most …

You can up software supply chain security by implementing these measures
The COVID-19 pandemic has been a driving force in digital acceleration, and it continues to wield its influence in how organizations and their staff embrace work. In the push …

What developers want and how to keep them on your team
OutSystems released a new developer jobs report identifying the factors that motivate them to stay with their companies and the frustrations that drive them away. The report, …

Will cyber saber-rattling drive us to destruction?
As cyberattacks have grown increasingly destructive, nations are entertaining the idea of responding to them with conventional military forces. It is difficult to determine …

Scams targeting cryptocurrency enthusiasts are getting more prevalent
Crypto giveaway scams have evolved into an illicit market segment with multiple services that aim to facilitate fraudulent operations. The growth of fake crypto giveaways can …

Cyberattacks in healthcare sector more likely to carry financial consequences
Netwrix announced additional findings for the healthcare sector from its global 2022 Cloud Security Report, revealing that 61% of respondents in the healthcare industry …

Week in review: OpenSSL critical fix, Medibank data breach, Apple fixes zero-day vulnerability
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Incoming OpenSSL critical fix: Organizations, users, get ready! The OpenSSL …

Delivering visibility requires a new approach for SecOps
As the world watches the conflict with Russia unfold, cybersecurity defenders are working overtime. Defenders are being asked by key stakeholders, boards, and even CISA for …

Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide
In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)