Help Net Security

Why poor visibility is hampering cybersecurity
Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …

Only 12% of banks appear to be fully committed to digital transformation
The US$1 trillion that traditional retail and commercial banks have invested globally over the past three years to transform their IT operations has not yet delivered the …

Week in review: Kali Linux roadmap, runtime container security, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks Tesla …

Countering industrial cyberthreats with secure, standards-based, licensed wireless networks
Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These …

High-risk vulnerabilities found in 1/3 of iOS apps, nearly half of Android apps
Expert testing of iOS and Android mobile applications shows that in most cases, insecure data storage is the most common security flaw in mobile apps. Positive Technologies’ …

Insured losses from a cyber catastrophe could reach billions
Analysis shows insured business interruption losses from a cyber catastrophe could reach an estimated $3.25 billion. Kovrr, a predictive cyber risk modeling company, released …

41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025
The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …

Webinar: Inside a Docker cryptojacking exploit
In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, …

(IN)SECURE Magazine issue 62 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 62 has been released today. Table of contents …

IoT explodes worldwide, researchers investigate security issues present in the devices real users own
About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, …

How to add security to digital transformation processes
In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about adding security to digital transformation processes. …

Botnets shift from Windows towards Linux and IoT platforms
Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems