Help Net Security
![Swissbit iShield Key Pro](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/27084255/swissbit-ishield_key_pro-1500-400x200.webp)
Product showcase: Protect digital identities with Swissbit’s iShield Key Pro
In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29114607/quantum_computing-1400-400x200.jpg)
Preparing for Q-Day as NIST nears approval of PQC standards
Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely …
![Infosec products of the month](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28092100/infosec-month-1200-400x200.webp)
Infosec products of the month: June 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Appdome, ARMO, Atsign, Cofense, Datadog, Diligent, Entrust, eSentire, …
![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25124830/cybersecurity-week-review-1-1500-400x200.webp)
Week in review: MOVEit auth bypass flaws quitely fixed, open-source Rafel RAT targets Androids
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Progress quietly fixes MOVEit auth bypass flaws (CVE-2024-5805, …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25140016/ciso-see-1500-400x200.webp)
CISOs becoming more comfortable with risk levels
Shifts in the cyber threats landscape have changed the way today’s CISOs evaluate their business’s risk appetite, according to Netskope. CISO risk appetite levels …
![bots](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25140632/bots-red-1500-400x200.webp)
Web scraping is not just a security or fraud problem
Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations Web scraping is not …
![Infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28091843/infosec-week-1200-400x200.webp)
New infosec products of the week: June 28, 2024
Here’s a look at the most interesting products from the past week, featuring releases from ARMO, Cofense, Datadog, and eSentire. Datadog LLM Observability secures generative …
![US Department of Justice](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16114335/usa-doj-1400-1-400x200.jpg)
US offers $10 million for information on indicted WhisperGate malware suspect
A federal grand jury in Maryland returned an indictment charging a Russian citizen with conspiracy to hack into and destroy computer systems and data. If convicted, he faces a …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31190412/world-400x200.webp)
New ransomware, infostealers pose growing risk in 2024
BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious …
![vulnerabilities](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17143802/vulnerabilities-1500-400x200.webp)
75% of new vulnerabilities exploited within 19 days
Last year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes — averaging 600 new vulnerabilities per week, …
![database management](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/20110841/database_management-1500-400x200.webp)
Enterprises increasingly turn to cloud and AI for database management
Across various tasks, from predictive analytics to code generation, organizations in all sectors are exploring how AI can add value and increase efficiency. In this Help Net …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21124934/github-door-1500-400x200.webp)
Developer errors lead to long-term exposure of sensitive data in Git repos
Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege