Help Net Security

71% of organizations experienced BEC attacks over the past year
Business email compromise (BEC) attacks are one of the most financially damaging cyber crimes and have been on the rise over the past year. This is according to GreatHorn …

Cyberattack traffic targeting video game industry surged during the pandemic
Cyberattack traffic targeting the video game industry grew more than any other industry during the COVID-19 pandemic. According to Akamai’s report, the video game industry …

Cyberstalking tendencies in modern day relationships
One-third of adults who have been in a romantic relationship admit to cyberstalking their current or former partners, a special addendum to the 2021 Norton Cyber Safety …

How to convince your boss that cybersecurity includes Active Directory
Preparing for and defending against a cyberattack demands Active Directory (AD) be part of a company’s overall strategy. But AD often gets overlooked in security discussions …

Combatting OpSec threats to our COVID-19 vaccination efforts: What can we do?
COVID-19 vaccines have been rolling out for a few months now, but the nature of the pandemic and the number of people impacted by it mean that demand for these vaccines is …

Most third-party libraries are never updated after being included in a codebase
79% percent of the time, third-party libraries are never updated by developers after being included in a codebase – despite the fact that more than two thirds of fixes …

MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats
D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to …

It takes less than one hour to exploit vulnerable container infrastructure
Aqua Security published a research revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than …

What is the impact of remote work on security best practices?
Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …

Digital identity verification spend to reach $16.7 billion in 2026
Spending on digital identity verification by businesses will reach $16.7 billion in 2026, from $9.4 billion in 2021, Juniper Research finds. Digital identity verification is …

SOC burnout is real: 3 preventative steps every CISO must take
Consider this scenario: Morgan, a level 3 security analyst, arrives to a twelve-hour security operations center (SOC) shift and finds a message that a network sensor is …

Shame culture is the biggest roadblock to increasing security posture
Cybersecurity culture is nearly impossible to quantify due to an absence of measurement tools. Many businesses attempt to quantify the human element of their security posture …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware