Help Net Security

The anti social network
Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people …

Will February’s Patch Tuesday fix a known zero-day?
Coming into Patch Tuesday we have a known zero day on the Microsoft side, and we’ve seen example code for an SMB exploit that could lead to DoS and BYOD of a system. US …

CERT updates insider threat guidebook
The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University released the fifth edition of the Common Sense Guide to Mitigating Insider Threats. …

Vera for Mail protects the confidentiality of email messages and attachments
Vera for Mail is an enterprise-grade security solution that lets businesses secure, track, and revoke access to any email they send. Built on Vera’s data-centric security …

LaunchKey: Passwordless consumer authentication at scale
iovation announced its LaunchKey mobile multifactor authentication solution. It empowers global consumer brands to improve security and consumer experience by delivering a …

DDoS attacks increasingly form blended attacks of more vulnerabilities
DDoS attacks increasingly formed blended attacks of four or more vulnerabilities over the course of the fourth quarter of 2016, with an intent to overload targeted monitoring, …

Less than half of organizations trust their data for business decisions
Data is being used by businesses in more ways than ever before, but they still lack trust in their data. While data supports major business initiatives, the level of data …

Security practices need to evolve in order to handle complex threats
There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. …

Soon, organizations will be valued on their information portfolios
By 2021, the prevalence of equity analysts valuing organizations’ information portfolios in valuing businesses themselves will spark formal internal information …

Sophos acquires Invincea
Sophos has agreed to acquire Invincea from its current shareholders for a cash consideration of $100 million with a $20 million earn-out. Sophos will retain the company’s …

Phishing trends: Who is targeted and why
The business model of phishing has evolved. The bad guys have found ways to multiply their profits at the expense of organizations they aren’t even attacking directly, …

Monitoring scanning activities that could lead to IoT compromises
IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?