• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up
  • NIST Cybersecurity Framework: Five years later
  • Snapd flaw gives attackers root access on Linux systems

Zyxel Communications

Get our Top Stories to your inbox
laptop

New infosec products of the week​: October 19, 2018

  • October 19, 2018
  • A10 Networks
  • IBM
  • Jetico

IBM rolls out cybersecurity operations center on wheels IBM Security launched the mobile Security Operations Center, capable of traveling onsite for cybersecurity training, …

Zyxel launches SD-WAN solution for SMBs and MSPs

  • October 17, 2018
  • Zyxel Communications

Zyxel Communications launches Zyxel SD-WAN, the software-defined wide area network solution. Zyxel SD-WAN enables SMBs and Managed Service Providers (MSP) to optimize network …

Tatsoft

New infosec products of the week​: October 5, 2018

  • October 5, 2018
  • Aerohive Networks
  • CloudKnox
  • FireEye

Detect, investigate and act on all threats with Splunk Security solutions Splunk’s expanded suite of security solutions helps security analysts monitor, visualize, detect, …

Zyxel launches ZyWALL ATP firewalls with deep learning

  • October 4, 2018
  • Zyxel Communications

Zyxel Communications announced a new range of ZyWALL Advanced Threat Protection (ATP) Firewalls that bring artificial intelligence and deep learning network security to small- …

router

Regularly updating your wireless router is not enough to ward off attacks

  • October 3, 2018
  • Asus
  • AVM
  • Belkin

Wireless routers are the most often attacked and exploited type of IoT device. They are also one of the rare IoT devices that most of us can’t do without. We need them …

New Zyxel NebulaFlex Switches offer the choice of cloud management or stand alone web management

  • October 1, 2018
  • Zyxel Communications

Zyxel Communications has enhanced the versatility and management of their networking solutions with the announcement of two new NebulaFlex hybrid Gigabit Ethernet Smart …

open lock

Networking vendors patch ​against new cryptographic attack

  • August 15, 2018
  • Cisco
  • Clavister
  • cryptographic attack

Vulnerable IPSec IKE implementations used in Cisco, Huawei, ZyXel and Clavister networking devices can allow attackers to retrieve session keys and decrypt connections, …

fire

IoT botnet bypasses firewalls to get to ZyXEL modems

  • February 15, 2018
  • botnet
  • exploit
  • Internet of Things

NewSky Security’s honeypots have detected a new IoT botnet in the making. The botnet was named DoubleDoor, as it leverages two distinct backdoors to get to the target: …

Proxmox Mail Gateway

New infosec products of the week​: January 26, 2018

  • January 26, 2018
  • Carbon Black
  • Exabeam
  • Fidelis Cybersecurity

Empowering security teams with unlimited security data collection, indexing and search Exabeam Data Lake centralizes all relevant logs to reduce the work of collecting logs …

bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

bot

Machine learning fundamentals: What cybersecurity professionals need to know

programmer

Three reasons employee monitoring software is making a comeback

vault

Bank of Valletta suspended all operations in wake of cyber attack

Don't miss

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

users

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX