Help Net Security
The zero trust security market continues to grow
The global zero trust security market is projected to surpass $66,741.3 million, increasing from $18,500.0 million in 2019, at a CAGR of 17.6% from 2020 to 2027 timeframe, …
Identifying and addressing critical OT asset vulnerabilities in 24/7 industrial operations
Cybersecurity is a race. A race that has for over a decade been extended to include systems that run the world’s industrial facilities, where a breach can compromise more than …
Hackers are leveling up and catching healthcare off-guard
Remember when ransomware operators promised last year not to attack hospitals under siege from COVID-19? Unfortunately, that didn’t happen: hospitality, entertainment, …
Hiring remote software developers: How to spot the cheaters
For the past year, moving to an all-remote workforce has often been positioned as a silver lining to the pandemic. Software engineers, in particular, reported a better …
Double-extortion ransomware attacks on the rise
Zscaler announced a report featuring analysis of key ransomware trends and details about the most prolific ransomware actors, their attack tactics and the most vulnerable …
Enterprise leaders now see cybersecurity as a business advantage
Enterprise leaders who previously viewed cybersecurity as part of traditional infrastructure have shifted to rapidly invest in integrated, cloud-based approaches, with ripple …
Commercial third party code creating security blind spots
Despite the fact that third party code in IoT projects has grown 17% in the past five years, only 56% of OEMs have formal policies for testing security, a VDC Research …
All you need to know about Capture-The-Flag (CTF) competitions
ENISA released a report addressing the contemporary use of Capture-The-Flag (CTF) competitions around the world. It explores how these competitions work and provides a …
Do consumers now feel more exposed than ever to the risk of fraud?
As the pandemic drove consumers online en masse to make purchases, consumer anxiety around fraud saw a considerable spike, according to a survey by Marqeta. The company …
Dealing with ransomware attacks: What options do you have?
IT decision-makers often find themselves stuck between a rock and a hard place when it comes to dealing with ransomware attacks. Do they pay a large sum of money to …
Cyber investigations, threat hunting and research: More art than science
While it’s true that threat hunting, incident response, and threat research all have their foundations in science (operating system theory and architecture, computer language …
85% of breaches involve the human element
The 2021 Verizon Data Breach Investigations Report (DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform