Help Net Security

Most malware in Q1 2020 was delivered via encrypted HTTPS connections
67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and 72% of encrypted malware was classified as zero day, so would have evaded signature-based …

Study of global hackers and the economics of security research
Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers …

Employees often overlooked when companies adopt new technology
Companies are placing business and shareholder goals above employee needs when they adopt new technology, according to Lenovo. The research, conducted among 1,000 IT managers …

New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …

How to protect remote workers from phishing and other attacks
Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past decade. In fact, between 1996 and 2016 …

Fixing all vulnerabilities is unrealistic, you need to zero in on what matters
As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …

Consumer security concerns at an all-time high, but priorities have shifted
31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security survey. Consumer security …

5 cybersecurity considerations for getting back to work securely
As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors …

Cyber readiness has improved, but potential blind spots remain
Businesses are enhancing levels of spending and activity to minimize their vulnerability to cyber incidents and breaches, according to Hiscox. The annual Hiscox Cyber …

Employees are worried about cyber threats in their home office environments
IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. Cyber threats in …

Business functions fail to collaborate on digitization
Many companies do not realize the full value of investing in digital projects due to a lack of collaboration among their critical business functions, according to a study by …

Guide: How to assess your email vulnerability for free in 20 minutes
This guide is no longer available. Attacks delivered via email are extremely common and the fact is that many popular security solutions are just not handling these attacks …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)