Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Field-programmable gate arrays
Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT

Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components that can be employed in a more flexible …

Car
How likely are weaponized cars?

It is easy to become absorbed by the exaggerated Hollywood depictions of car hacking scenarios – to imagine a not-so-distant future when cars or their supporting …

zero
Why zero trust is crucial to compliance

The enterprise faces a brand new world when it comes to data privacy and security. New regulations like the General Data Protection Regulation (GDPR) and the California …

open source
Growing reliance on open source libraries leaves many companies vulnerable

Organizations are becoming increasingly dependent on open source libraries (OSLs) to develop code for software and websites. However, Jing Xie, senior threat intelligence …

cloud
Cloud migration journey is more complex than anticipated for innovation and efficiency

Two-thirds of large enterprises are not realizing the full benefits of their cloud migration journeys identifying security and the complexity of business and operational …

people
Week in review: BlueKeep, GitHub automated security fixes, reducing the threat of legacy apps

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Attackers are exploiting WordPress plugin flaw to inject malicious scripts …

biohazard
Researchers fight ransomware attacks by leveraging properties of flash-based storage

Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …

colors
What mechanisms can help address today’s biggest cybersecurity challenges?

In this Help Net Security podcast, Syed Abdur Rahman, Director of Products with unified risk management provider Brinqa, talks about their risk centric knowledge-driven …

see
Researchers spot manipulated photos and video using AI-driven imaging system

To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School of Engineering have demonstrated an experimental technique to authenticate …

Money
Majority of CISOs plan to ask for an increase in cybersecurity investment

Most CISOs of financial institutions (73 percent) plan to ask their organization’s CFO for an increase in cybersecurity investments in the next year, according to the …

Broken glass
Security overconfidence and immaturity continue to endanger organizations

The majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. …

connected house
New initiative aims to strengthen IoT security, interoperability and reliability

The Zigbee Alliance publicly announced a major ongoing initiative to make smart home and IoT products easier to develop, deploy, and sell across ecosystems. The All Hubs …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools