Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
insider threat
Terminated contract led to $2.5 million cyber extortion scheme

A federal jury convicted Cameron Curry, 27, a Charlotte resident, of carrying out an extensive cyber extortion scheme targeting a Washington, D.C.-based international …

botnet
Authorities disrupt four IoT botnets behind record DDoS attacks

The U.S. Justice Department and international partners have disrupted four IoT botnets linked to DDoS attacks that reached 30 terabits per second, among the largest ever recorded.

CISA
Secure endpoint management systems immediately, CISA urges

The US Cybersecurity and Infrastructure Security Agency (CISA) warns that the cyberattack on Stryker Corporation serves as a signal to U.S. organizations that foreign cyber …

US Department of Justice
Authorities dismantle SocksEscort proxy network behind millions in fraud

SocksEscort, a residential proxy network used to exploit thousands of compromised home routers worldwide and facilitate large-scale fraud that cost victims millions of …

cyber threat
War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the …

phishing
Phishing campaign spoofs local officials to steal permit fees

The FBI is warning about a phishing scheme in which cybercriminals impersonate city and county officials to solicit fraudulent payments for planning and zoning permits. …

USA
No more soft play, President Trump warns in new cyber strategy

The White House released “President Trump’s Cyber Strategy for America,” a policy framework outlining the administration’s priorities for maintaining U.S. leadership in …

door
Iran-linked APT targets US critical sectors with new backdoors

An Iran-linked hacking group has been active inside the networks of several US organizations since early February, raising concerns that the activity could precede broader …

healthcare data
New cyber module strengthens risk planning for health organizations

The Administration for Strategic Preparedness and Response’s (ASPR) new cybersecurity module in the Risk Identification and Site Criticality (RISC) 2.0 Toolkit helps …

US Department of Justice
Ex-L3Harris executive sentenced to 87 months for selling stolen cyber-exploit trade secrets

Peter Williams, a former executive of Trenchant, L3Harris’ cyber division, has been sentenced to 87 months in prison by a federal judge in Washington, D.C., after pleading …

CISA
Binding Operational Directive 26-02 sets deadlines for edge device replacement

In this Help Net Security video, Jen Sovada, General Manager, Public Sector at Claroty, explains CISA’s Binding Operational Directive 26-02 and what it means for federal …

US Department of Justice
Ex-Google engineers charged with orchestrating high-tech secrets extraction

A federal grand jury has indicted three Silicon Valley engineers on charges in a scheme to steal trade secrets from Google and other leading technology companies. The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools