Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
forget
Inside the economy built on stolen credentials

Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls …

DDoS
Predicting DDoS attacks: How deep learning could give defenders an early warning

Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks …

drone
The fight to lock down drones and their supply chains

Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological …

USA
U.S. Secret Service takes down network of devices threatening government officials

The U.S. Secret Service has broken up a network of electronic devices spread across the New York tristate area that officials say posed an imminent threat to national …

person
Cybercriminals are going after law firms’ sensitive client data

Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been …

malware
The unseen side of malware and how to find it

Security teams rely on threat reports to understand what’s out there and to keep their organizations safe. But a new report shows that these reports might only reveal part of …

Biohazard
Old file types, new tricks: Attackers turn everyday files into weapons

Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that workers and IT teams often trust. The latest …

attack
Ransomware, vendor outages, and AI attacks are hitting harder in 2025

Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these …

botnet
New threat group uses custom tools to hijack search results

ESET Research has identified a new threat group called GhostRedirector. In June 2025, this group broke into at least 65 Windows servers, mostly in Brazil, Thailand, Vietnam, …

Salesforce
Attackers are turning Salesforce trust into their biggest weapon

Salesforce has become a major target for attackers in 2025, according to new WithSecure research into threats affecting customer relationship management (CRM) platforms. The …

maritime cybersecurity
Maritime cybersecurity is the iceberg no one sees coming

Maritime transport, the backbone of global trade, is adapting to shifting economic, political, and technological conditions. Advances in technology have improved efficiency, …

social engineering
The new battleground for CISOs is human behavior

This article is no longer available. Check out our news from this week here: Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools