searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Week in review

Get our top stories in your inbox

Week in review: Social media-enabled cybercrime, fighting credential stuffing, digital signature spoofing

March 3, 2019

Here’s an overview of some of last week’s most interesting news and articles: How WebAuthn aims to solve the password problem Rather than tasking users with …

Week in review: Formjacking, flawed password managers, phishers’ new trick

February 24, 2019

Here’s an overview of some of last week’s most interesting news and articles: IT security incidents affecting German critical infrastructure are on the rise In …

Week in review: RunC, Snapd flaws, Zero Trust browsing, 5 years of NIST Cybersecurity Framework

February 17, 2019

Here’s an overview of some of last week’s most interesting news and articles: Machine learning fundamentals: What cybersecurity professionals need to know In this …

Week in review: Vaporworms, 8 months of GDPR, penetration testing effectiveness

February 10, 2019

Here’s an overview of some of last week’s most interesting news and articles: Why vaporworms might be the scourge of 2019 Not too long ago, the WatchGuard Threat …

Week in review: FaceTime bug, Apple developer certs abused, new privacy attack against 5G

February 3, 2019

Here’s an overview of some of last week’s most interesting news and articles: New Mac malware steals cookies, cryptocurrency and computing power A new piece of Mac …

Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

January 27, 2019

Here’s an overview of some of last week’s most interesting news and articles: Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution A …

Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks

January 20, 2019

Here’s an overview of some of last week’s most interesting news and articles: Compromised ad company serves Magecart skimming code to hundreds of websites The …

Week in review: How data becomes intelligence, email security predictions, EU bug bounties

January 13, 2019

Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of …

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting

December 16, 2018

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role …

Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE

December 9, 2018

Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking …

Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai

December 2, 2018

Here’s an overview of some of last week’s most interesting news and articles: The fundamentals of network security and cybersecurity hygiene The two fundamental …

Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery

November 25, 2018

Here’s an overview of some of last week’s most interesting news and articles: Don’t accept risk with a pocket veto No security professional wants to accept risk. …

Posts navigation

1 … 11 12 13 14 15 16 17 18 19 … 49

Featured news

  • How a cyber asset management strategy can help enterprises detect threats
  • Applying Shift Left principles to third party risk management
  • Malicious activities insiders perform in enterprise applications
CISA and NPower offer free entry-level cybersecurity training

What's new

NIST selects 4 quantum-resistant encryption algorithms

The connected nature of smart factories is exponentially increasing the risk of cyber attacks

CISA and NPower offer free entry-level cybersecurity training

Why your API gateway is not enough for API security?

Don't miss

CISA and NPower offer free entry-level cybersecurity training

NIST selects 4 quantum-resistant encryption algorithms

How a cyber asset management strategy can help enterprises detect threats

Why your API gateway is not enough for API security?

Attackers are using deepfakes to snag remote IT jobs

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • CISA and NPower offer free entry-level cybersecurity training
  • Attackers are using deepfakes to snag remote IT jobs
  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise