Help Net Security
Wolfi: A Linux undistro with security measures for the software supply chain
Wolfi is a new community Linux undistribution that combines the best aspects of existing container base images with default security measures that will include software …
Python tarfile vulnerability affects 350,000 open-source projects (CVE-2007-4559)
Trellix Advanced Research Center published its research into CVE-2007-4559, a vulnerability estimated to be present in over 350,000 open-source projects and prevalent in …
What you need to know about Evil-Colon attacks
While novel attacks seem to emerge faster than TikTok trends, some warrant action before they’ve even had a chance to surface. This is the case for an attack we’ll refer to as …
Email-based threats: A pain point for organizations
In this Help Net Security video, Igal Lytzki, Incident Response Analyst at Perception Point, discusses a recent Remcos RAT malware campaign and more broadly, the threat that …
The best ways to safeguard crypto assets
The mainstream emergence of cryptocurrency, coupled with its popularity among cybercriminals, has created a potentially dangerous environment for those with significant crypto …
What could be the cause of growing API security incidents?
Noname Security announced the findings from its API security report, “The API Security Disconnect – API Security Trends in 2022”, which revealed a rapidly growing number of …
SMBs vs. large enterprises: Not all compromises are created equal
Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. Lumu has found that compromise is …
Agent-based vs. agentless security: Pros and cons
In this Help Net Security video, Mark Nunnikhoven, Distinguished Cloud Strategist at Lacework, discusses agent-based vs. agentless approaches in security. Ransomware is …
Is $15.6 billion enough to protect critical infrastructure?
Several bills totaling $15.6 billion are making their way through the House for the 2023 fiscal year. While $11.2 billion will go to the Department of Defense, $2.9 billion …
3 free Linux security training courses you can take right now
Linux Server Management and Security University of Colorado / Instructor: Greg Williams, Lecturer This course dives into how Linux works from an enterprise perspective: In …
The explosion of data is beyond human ability to manage
Dynatrace announced the results of an independent global survey of 1,303 CIOs and senior cloud and IT operations managers in large organizations, showing that as the move …
20/20 visibility is paramount to network security
Infoblox announced the results of a Forrester Consulting study, which found IT leaders around the world share a ubiquitous appetite for greater network visibility. The …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims