searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Week in review

Get our top stories in your inbox

Week in review: Active Directory security, Dnsmasq vulnerabilities, how to select a fraud detection solution

January 24, 2021

Here’s an overview of some of last week’s most interesting news and articles: Dnsmasq vulnerabilities open networking devices, Linux distros to DNS cache poisoning …

Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day

January 17, 2021

Here’s an overview of some of last week’s most interesting news and articles: Top videoconferencing attacks and security best practices Videoconferencing has …

Week in review: Fileless malware, key risk areas in 2021, Patch Tuesday forecast

January 10, 2021

Here’s an overview of some of last week’s most interesting news, articles and reviews: January 2021 Patch Tuesday forecast: New focus on security and software …

Week in review: SolarWinds hack and related attacks, life without passwords, how to make DevSecOps stick

December 20, 2020

Here’s an overview of some of last week’s most interesting news and articles: The SolarWinds supply chain attack and related hacks When the week before last …

Week in review: FireEye breach, vulnerable TCP/IP stacks, Kali Linux and the future of pentesting

December 13, 2020

Here’s an overview of some of last week’s most interesting news and articles: FireEye breach: State-sponsored attackers stole hacking tools U.S. cybersecurity …

Week in review: Most effective security practices, worst password offenders, Patch Tuesday forecast

December 6, 2020

Here’s an overview of some of last week’s most interesting news, reviews, articles and podcasts: Open source vulnerabilities go undetected for over four years For …

Week in review: Drupal-based sites open to attack, cPanel 2FA bypass vulnerability

November 29, 2020

Here’s an overview of some of last week’s most interesting news and articles: Challenges organizations face in combating third-party cyber risk A CyberGRX report …

Week in review: Kali Linux 2020.4, AWS Network Firewall, speeding up malware analysis

November 22, 2020

Here’s an overview of some of last week’s most interesting news, reviews and articles: Kali Linux 2020.4 released: New default shell, fresh tools, and more! …

Week in review: Cybersecurity workforce gap decreases, new issue of (IN)SECURE

November 15, 2020

Here’s an overview of some of last week’s most interesting news and articles: Every employee has a cybersecurity blind spot 80% of companies say that an increased …

Week in review: Windows zero-day exploited, Patch Tuesday forecast, selecting a compliance solution

November 8, 2020

Here’s an overview of some of last week’s most interesting news, reviews and articles: Git LFS vulnerability allows attackers to compromise targets’ Windows …

Week in review: Automated pentesting, Oracle WebLogic servers under attack

November 1, 2020

Here’s an overview of some of last week’s most interesting news and articles: Easily exploitable RCE in Oracle WebLogic Server under attack (CVE-2020-14882) A …

Week in review: Confidential computing, data protection predictions, Sandworm hackers charged

October 25, 2020

Here’s an overview of some of last week’s most interesting news, reviews and articles: What is confidential computing? How can you use it? What is confidential …

Posts navigation

1 … 3 4 5 6 7 8 9 10 11 … 48

Featured news

  • Exploring the insecurity of readily available Wi-Fi networks
  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Researchers uncover ZuoRAT malware targeting home-office routers

Trends to watch when creating security strategy for the next two years

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Exploring the insecurity of readily available Wi-Fi networks

Don't miss

Researchers uncover ZuoRAT malware targeting home-office routers

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Trends to watch when creating security strategy for the next two years

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise