Help Net Security

Review: Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …

The distinction between human and bot behavior is becoming increasingly blurred
There’s no denying that the way people have been using the Internet and online stores has changed over the last couple of months. As consumers change their online habits, the …

What is privacy and why does it matter?
Privacy is a basic right and a necessary protection in the digital age to avoid victimization and manipulation. In much of the world, privacy is considered a basic human …

NIST selects algorithms to form a post-quantum cryptography standard
The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. Post-quantum cryptography standard After spending …

75% of cardholders prefer contactless cards to other payment methods
Based on responses from 1,000 U.S. cardholders who are familiar with contactless credit/debit card or “tap and pay” technology, a new Entrust Datacard survey reveals that 75% …

It’s time to tap the next generation of cyber defenders
As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their …

Attackers have created a specialized economy around email account takeover
Barracuda released key findings about the ways cybercriminals are attacking and exploiting email accounts. The report reveals a specialized economy emerging around email …

DeimosC2: Open source tool to manage post-exploitation issues
TEAMARES launched DeimosC2, addressing the market need for a cross-compatible, open source Command and Control (C2) tool for managing compromised machines that includes mobile …

Integrated cloud-native security platforms can overcome limitations of traditional security products
To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial …

Data crisis: Companies pivot from disruption to transformation
Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …

Week in review: PoC for wormable SharePoint RCE released, how to select a DMARC solution
Here’s an overview of some of last week’s most interesting news and articles: Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into …

Ransomware recovery: Moving forward without backing up
Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)