searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Week in review

Get our top stories in your inbox

Week in review: VMware critical fixes, Bluetooth LE flaw unlocks cars, Kali Linux 2022.2

May 22, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, …

Week in review: F5 BIG-IP RCE exploitation, URL spoofing flaws in Zoom, Google Docs

May 15, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft patches Windows LSA spoofing zero-day under active attack (CVE-2022-26925) …

Week in review: F5 BIG-IP flaw, critical bugs in Aruba and Avaya network switches, Patch Tuesday forecast

May 8, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: May 2022 Patch Tuesday forecast: Look beyond just application and OS updates April …

Week in review: Quantum Locker ransomware, most exploited vulnerabilities in 2021

May 1, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Meteoric attack deploys Quantum ransomware in mere hours A group wielding the Quantum …

Week in review: Outdated open source, the role of the lawyer in cybersecurity

April 24, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: The changing role of the CCO: Champion of innovation and business continuity In this …

Week in review: Attackers exploiting VMware RCE, Microsoft fixes actively exploited zero-day

April 17, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft fixes actively exploited zero-day reported by the NSA (CVE-2022-24521) On …

Week in review: Disrupted Cyclops Blink botnet, public software apps at risk, Patch Tuesday forecast

April 10, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: April 2022 Patch Tuesday forecast: Spring is in the air (and vulnerable) March Patch …

Week in review: Spring4Shell vulnerability, attackers exploiting patched RCE in Sophos Firewall

April 3, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Spring4Shell: No need to panic, but mitigations are advised Security teams around the …

Week in review: Lapsus$ breaches Okta and Microsoft, Red Team 101, cybersecurity during M&As

March 27, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Lapsus$ gang says it has breached Okta and Microsoft After breaching NVIDIA and …

Week in review: The secret to app security, new issue of (IN)SECURE Magazine

March 20, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 71 released (IN)SECURE Magazine is a free digital security …

Week in review: Linux bug gives root access to attackers, UPS devices’ vulns, IoT security for OEMs

March 13, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Mozilla fixes Firefox zero-days exploited in the wild (CVE-2022-26485, …

Week in review: Medical device IP protection, how to select a CDR solution, Patch Tuesday forecast

March 6, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: March 2022 Patch Tuesday forecast: Pressure mounts to resolve vulnerabilities …

Posts navigation

1 2 3 4 5 … 48

Featured news

  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
Easily migrate to the cloud with CIS Hardened Images

What's new

What does prioritizing cybersecurity at the leadership level entail?

Vishing cases reach all time high

Paying the ransom is not a good recovery strategy

How confident are CISOs about their security posture?

Don't miss

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

You should be able to trust organizations that handle your personal data

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise