Help Net Security

Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership
Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, …

Rampant password reuse puts companies and customers at risk
25.9 million business account credentials and over 543 million breach assets tied to employees in the Fortune 1000 are readily available on the criminal underground, SpyCloud …

CFOs are becoming catalysts of digital strategy
As the pandemic continues to challenge organizations worldwide, the role of chief financial officers (CFOs) has moved further beyond “economic guardians” of the enterprise to …

Week in review: Improving vulnerability triage, RDP attacks soaring, hackers in high demand
Here’s an overview of some of last week’s most interesting news and articles: Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack Forescout …

For SOC teams, the analytics and automation hype is real
Tools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity, and unlimited scalability—and it couldn’t come at a better …

5 cybersecurity trends MSPs must address in 2021
2020 was chock full of surprises and twists that no analyst could have predicted and came with a massive shift to remote working and tools that facilitate it. The good news is …

Successful BEC attacks become 56% more costly
The number of phishing attacks grew through 2020, fully doubling over the course of the year. Attacks peaked in October 2020, with a high of 225,304 new phishing sites …

mHealth apps consistently expose PII and PHI through APIs
All of the 30 popular mHealth apps that were tested are vulnerable to API attacks that can allow unauthorized access to full patient records including protected health …

2020 vulnerability disclosures on track to exceed those from 2019
2020 vulnerability disclosures are on track to exceed 2019 despite a sharp decrease of 19.2% observed earlier in the year, according to Risk Based Security. The team …

Researchers spot massive increase in RDP attack attempts
The COVID-19 pandemic continued to influence the cybercrime landscape in 2020, ESET reveals. Most notably, the new attack surface created by the shift to work from home …

Big Tech will try to pre-empt harsh privacy laws by writing their own
Over the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era. Amazon, Apple, …

Protecting productivity within the disappearing perimeter
During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations