Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
biometrics
Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t notice. Like any system, …

Android
Your budget Android phone might be spying on you

Researchers have found that many low-cost Android devices come with pre-installed apps that have high-level access to the system. Unlike apps from the Google Play Store, many …

Firezone
Firezone: Open-source platform to securely manage remote access

Firezone is an open-source platform that helps organizations of any size manage secure remote access. Unlike most VPNs, it uses a least-privileged model, giving users only the …

forget
Inside the economy built on stolen credentials

Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls …

ransomware
Ransomware groups are multiplying, raising the stakes for defenders

Ransomware activity is climbing again, with a steep increase in the number of victims and the number of groups launching attacks. A new mid-year report from Searchlight Cyber …

Delinea
Delinea releases free open-source MCP server to secure AI agents

AI agents are becoming more common in the workplace, but giving them access to sensitive systems can be risky. Credentials often get stored in plain text, added to prompts, or …

North Korea
North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active in recent years and …

DDoS
Predicting DDoS attacks: How deep learning could give defenders an early warning

Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks …

drone
The fight to lock down drones and their supply chains

Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological …

hand
APIs and hardware are under attack, and the numbers don’t look good

Attackers have a new favorite playground, and it’s not where many security teams are looking. According to fresh data from Bugcrowd, vulnerabilities in hardware and APIs are …

USA
U.S. Secret Service takes down network of devices threatening government officials

The U.S. Secret Service has broken up a network of electronic devices spread across the New York tristate area that officials say posed an imminent threat to national …

person
Cybercriminals are going after law firms’ sensitive client data

Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools