searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Week in review

Get our top stories in your inbox

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting

December 16, 2018

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role …

Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE

December 9, 2018

Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking …

Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai

December 2, 2018

Here’s an overview of some of last week’s most interesting news and articles: The fundamentals of network security and cybersecurity hygiene The two fundamental …

Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery

November 25, 2018

Here’s an overview of some of last week’s most interesting news and articles: Don’t accept risk with a pocket veto No security professional wants to accept risk. …

Week in review: Vaporworms, DevOps roadmap for security, ethical data management

November 18, 2018

Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of …

Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs

November 11, 2018

Here’s an overview of some of last week’s most interesting news and articles: Five key considerations when developing a Security Operations Center Organizations …

Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack

November 4, 2018

Here’s an overview of some of last week’s most interesting news and articles: New techniques expose your browsing history to attackers Security researchers at UC …

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

October 28, 2018

Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create …

Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?

October 21, 2018

Here’s an overview of some of last week’s most interesting news and articles: Who gets spear phished, and why? Spear phishing is one of the most successful methods …

Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free

October 14, 2018

Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found …

Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors

October 7, 2018

Here’s an overview of some of last week’s most interesting news and articles: APTs are targeting IT service providers Managed service providers (MSPs) and cloud …

Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures

September 30, 2018

Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you …

Posts navigation

1 … 14 15 16 17 18 19 20 21 22 … 51

Featured news

  • We can’t rely on goodwill to protect our critical infrastructure
  • The emergence of trinity attacks on APIs
  • Hybrid cloud storage security challenges
Guide: How virtual CISOs can efficiently extend their services into compliance readiness

Sponsored

eBook: 4 ways to secure passwords, avoid corporate account takeover

Here’s the deal: Uptycs for all of 2023 for $1

2022 Cloud Data Security Report

Don't miss

Patch your Jira Service Management Server and Data Center and check for compromise! (CVE-2023-22501)

We can’t rely on goodwill to protect our critical infrastructure

The emergence of trinity attacks on APIs

Hybrid cloud storage security challenges

Vulnerability in Cisco industrial appliances is a potential nightmare (CVE-2023-20076)

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us