searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Week in review

Get our top stories in your inbox

Week in review: The secret to app security, new issue of (IN)SECURE Magazine

March 20, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 71 released (IN)SECURE Magazine is a free digital security …

Week in review: Linux bug gives root access to attackers, UPS devices’ vulns, IoT security for OEMs

March 13, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Mozilla fixes Firefox zero-days exploited in the wild (CVE-2022-26485, …

Week in review: Medical device IP protection, how to select a CDR solution, Patch Tuesday forecast

March 6, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: March 2022 Patch Tuesday forecast: Pressure mounts to resolve vulnerabilities …

Week in review: Cyber attacks on Ukraine, Help Net Security: Healthcare Cybersecurity Report is out

February 27, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Help Net Security: Healthcare Cybersecurity Report has been released Our newest …

Week in review: Kali Linux 2022.1 released, attackers leveraging Microsoft Teams to spread malware

February 20, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2022.1 released: New tools, kali-linux-everything, visual …

Week in review: Malware targeting Linux-based OSes, Log4j exploitation risk

February 13, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Log4j exploitation risk is not as high as first thought, cyber MGA says …

Week in review: Samba vulnerability, phishing kits bypassing MFA, Patch Tuesday forecast

February 6, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: February 2022 Patch Tuesday forecast: A rough start for 2022 January 2022 …

Week in review: PolKit vulnerability, fake tax apps pushing malware, EU’s bug bounty for open source

January 30, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: PolKit vulnerability can give attackers root on many Linux distros …

Week in review: Finding stolen credentials on VirusTotal, BNPL attracting fraudsters

January 23, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Google Drive starts warning users about suspicious files Google has …

Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE

January 16, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: Phishers are targeting Office 365 users by exploiting Adobe Cloud …

Week in review: Discussing cybersecurity with the board, APT-style attacks, Patch Tuesday forecast

January 9, 2022

Here’s an overview of some of last week’s most interesting news, articles and interviews: January 2022 Patch Tuesday forecast: Old is new again Let’s look at some …

Week in review: Log4j new vulnerabilities, Microsoft patch bypass, 2022 e-commerce threat trends

December 26, 2021

Here’s an overview of some of last week’s most interesting news, articles and interviews: The Log4j saga: New vulnerabilities and attack vectors discovered The …

Posts navigation

1 2 3 4 5 6 7 8 9 10 … 52

Featured news

  • The root causes of API incidents and data breaches
  • Penetration tester develops AWS-based automated cracking rig
  • CISO-approved strategies for software supply chain security
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

The root causes of API incidents and data breaches

Penetration tester develops AWS-based automated cracking rig

CISO-approved strategies for software supply chain security

Phishers use encrypted file attachments to steal Microsoft 365 account credentials

New Buhti ransomware uses leaked payloads and public exploits

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us