searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Week in review

Get our top stories in your inbox

Week in review: BA breach, Magento sites under attack

September 9, 2018

Here’s an overview of some of last week’s most interesting news and articles: How metrics can enhance the effectiveness of security programs Choosing the right …

Week in review: Blocking compromised passwords, removing personal data from connected cars

September 3, 2018

Here’s an overview of some of last week’s most interesting news and articles: 0patch releases micropatch for Windows Task Scheduler zero-day Acros Security, the …

Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing

August 26, 2018

Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing …

Week in review: Office 365 phishing, compromising networks with malicious faxes

August 19, 2018

Here’s an overview of some of last week’s most interesting news and articles: AT&T sued for enabling SIM swap fraud A cryptocurrency investor is suing …

Week in review: IoT security, cyber hygiene, Social Mapper

August 12, 2018

Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: ​Choosing your defensive strategy One of the biggest …

Week in review: Deploying automation securely, dark web activities that indicate a breach

August 5, 2018

Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …

Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning

July 29, 2018

Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control …

Week in review: Zero-login, Magecart threat, cybersecurity expert shortage

July 22, 2018

Here’s an overview of some of last week’s most interesting news and articles: Dealing with a system launch: It requires more than just testing Rolling out new IT …

Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps

July 15, 2018

Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded …

Week in review: New LTE attacks, common API vulnerabilities, risk management trends

July 8, 2018

Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to …

Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3

July 1, 2018

Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and …

Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE

June 24, 2018

Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released …

Posts navigation

1 … 18 19 20 21 22 23 24 25 26 … 54

Featured news

  • The hidden costs of neglecting cybersecurity for small businesses
  • Kubernetes attacks in 2023: What it means for the future
  • New twist on ZeroFont phishing technique spotted in the wild
Guide: SaaS Offboarding Checklist

Sponsored

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Free entry-level cybersecurity training and certification exam

Guide: Attack Surface Management (ASM)

Don't miss

How to avoid the 4 main pitfalls of cloud identity management

The hidden costs of neglecting cybersecurity for small businesses

Kubernetes attacks in 2023: What it means for the future

New twist on ZeroFont phishing technique spotted in the wild

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us