Help Net Security

Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day
Here’s an overview of some of last week’s most interesting news and articles: Top videoconferencing attacks and security best practices Videoconferencing has …

What analytics can unveil about bot mitigation tactics
25% of internet traffic on any given day is made up of bots, the Kasada Research Team has found. In fact, there is a synthetic counterpart for almost every human interaction …

Understanding third-party hacks in the aftermath of SolarWinds
In the aftermath of the SolarWinds hack, a better understanding of third-party hacks in any update that you provide to your colleagues, bosses, and even the board of directors …

Fraudulent attempt purchase value decreased by $10 in 2020 compared to 2019
There has been a 24 percent increase in eCommerce transactions globally in December 2020 compared to December 2019, ACI Worldwide reveals. In particular, eCommerce …

Revenue for 5G enterprises in the Asia-Pacific region to reach $13.9B by 2024
Mega trends across the government and public sector, healthcare, manufacturing, and telecommunications are posing new challenges to end users in vertical industries in the …

Minimizing cyberattacks by managing the lifecycle of non-human workers
The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …

Healthcare IT teams battle with technical challenges to ensure network resilience and security
IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …

43% of financial services orgs plan to increase private cloud investments
Nutanix announced the financial services industry findings of its report, measuring organizations’ plans for adopting private, hybrid and public clouds. The findings point to …

The future history of medical device cybersecurity
In 1555, Nostradamus published his famous Les Prophéties containing obfuscated prophecies for the world to come. Some believe that one of these predictions pertains to the …

SOC analysts overloaded, but role more important than ever
Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

It’s time for a national privacy law in the US
Consumer data privacy is no longer a necessary evil but a competitive differentiator for any company participating in the global economy. The EU’s GDPR represents the world’s …

Addressing the lack of knowledge around pen testing
The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations