Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
fish phishing
Phishers’ favorite brands in Q4 2021

International courier and package delivery company DHL heads the list of most imitated brands by phishers and malware peddlers in Q4 2021, according to Check Point Research. …

Software
ServiceNow Messaging Service enables two‑way conversations between businesses and customers

ServiceNow announced ServiceNow Messaging Service to help organizations drive better service experiences from issue to resolution. Leveraging the Twilio platform, ServiceNow …

EMS announces fully managed bridge with WhatsApp, keeps an audit trail of conversation

EMS now offers a fully managed WhatsApp Bridging service (powered by Tulir’s open source mautrix-whatsapp bridge). Element gives a company a powerful end-to-end encrypted …

Amazon MemoryDB for Redis: Fast performance with sub-millisecond latency and high durability

Amazon Web Services announced the general availability of Amazon MemoryDB for Redis, a fully managed, Redis-compatible, in-memory database. Amazon MemoryDB for Redis enables …

Keysight Nemo 5G RAN Analytics software automates data processing, reporting and analytics

Keysight Technologies has launched the new Keysight Nemo 5G RAN Analytics software, a fully automated cloud-based solution for streamlining data processing, as well as …

Mitch Lowe invests in UseCrypt to offer privacy in the field of telecommunications

Mitch Lowe – co-founder senior executive of Netflix, long time president of Redbox and Moviepass, has joined UseCrypt. The official announcement took place in Monaco, …

email
Financial services accounting for nearly 40% of all phishing URLs

Vade released its Phishers’ Favorites report for H1 2021, which revealed that there has been a major jump in phishing attacks since the start of the year with a 281 percent …

Code42 enhances Incydr to help identify insider risk related to file uploads to unsanctioned websites

Code42 is introducing enhanced capabilities to the Code42 Incydr data risk detection and response product for identifying insider risk related to file uploads to unsanctioned …

lock
End-to-end encrypted communication mitigates enterprise security risk and ensures compliance

It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …

WhatsApp Telegram
Mobile messengers expose billions of users to privacy attacks

Popular mobile messengers expose personal data via discovery services that allow users to find contacts based on phone numbers from their address book, according to …

money
Cybercriminals are using IM platforms as marketplaces

Cybercriminals are increasingly using IM platforms like Telegram, Discord, Jabber, WhatsApp, IRC and others to advertise and sell their goods and services, IntSight …

Vade Secure phishing report
The 25 most impersonated brands in phishing attacks

PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools