Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Shortleash Backdoor
Stealthy backdoor found hiding in SOHO devices running Linux

SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. The threat is part of a broader …

GPS tracker detection
GPS tracker detection made easy with off-the-shelf hardware

Cyberstalkers are increasingly turning to cheap GPS trackers to secretly monitor people in real time. These devices, which often cost less than $30 and run on 4G LTE networks, …

connected car
Thieves don’t need your car keys, just a wireless signal

A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote Keyless Entry (RKE) systems, the auto industry has made …

Kali NetHunter mobile hacking rig
Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3 XL. It’s called the NetHunter C-deck, and it packs …

hard drive reliability
How 300,000+ hard drives performed in the real world

Cloud storage company Backblaze has released its Q1 2025 hard drive reliability report, which provides insights into the performance and failure rates of various HDD models …

Cisco
Cisco’s new chip wants to scale quantum computing faster

Cisco is making significant strides in quantum computing by focusing on quantum networking, aiming to bring practical applications closer to reality. The company recently …

Ledger Flex
Product showcase: Ledger Flex secure crypto wallet

The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features with a user-friendly interface, making it …

smart home
Your smart home may not be as secure as you think

The Internet of Things (IoT) has become a major part of daily life. Smartphones, smart thermostats, security cameras, and other connected devices make tasks easier and improve …

mobile device
Why rooting and jailbreaking make you a target

As cybercriminals have moved to a mobile-first attack strategy, rooting and jailbreaking mobile devices remain a powerful attack vector. Such mobile devices bypass critical …

healthcare
CISOs, are your medical devices secure? Attackers are watching closely

The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has …

Sara
Sara: Open-source RouterOS security inspector

Sara is an open-source tool designed to analyze RouterOS configurations and identify security vulnerabilities on MikroTik hardware. Sara’s main feature is using regular …

security
Overlooking platform security weakens long-term cybersecurity posture

Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools