Help Net Security

Middle East oil and gas companies are unprepared to address OT cyber risk
Cyber security breaches in the Middle East are widespread and frequently undetected, with 30 percent of the region’s attacks targeting operational technology (OT), finds a new …

Nmap 7.70 released: Better service and OS detection, 9 new NSE scripts, and more!
Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network …

AI deployments to drive investments in storage, networking, and cloud infrastructure
The race for making perfect hardware to accelerate artificial intelligence (AI) applications is heating up and many companies are jumping in with their products and solutions. …

RSA Conference Innovation Sandbox Contest 2018 finalists announced
RSA Conference announced the 10 finalists for its annual RSAC Innovation Sandbox Contest. The competition offers a leading platform for entrepreneurial cyber security …

A look inside the big business of cybercrime
For three months, Armor’s Threat Resistance Unit (TRU) research team compiled and analyzed data from the black market to shed light on the type of activity threat actors are …

Gartner unveils IT cost-optimization priority for CIOs
IT cost optimization in most organizations is now largely focused on business optimization rather than cost cutting, according to a recent survey by Gartner. Survey …

AI services market to reach $188 billion worldwide by 2025
Artificial intelligence (AI) has worked its way into a variety of industries, from the obvious (autonomous vehicles) to the hidden (anti-money laundering due diligence). But …

Why PKI will secure the Internet of Things for years to come
A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented …

Have you evaluated the cost of a cloud outage?
New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are …

Week in review: Big data and insurance, wireless standards hackers will target after Wi-Fi
Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of …

The great attribution debate: Why we should focus on HOW not WHO
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …

Cybercriminals launder money through mansions, private islands and crypto currency
Cybercriminal proceeds make up an estimated 8-10 percent of total illegal profits laundered globally, amounting to an estimated $80-$200 billion each year, according to a …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?