Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

Russian APT group actively exploiting Flash, Windows 0-day flaws

APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an “international government entity …

shadow
Organizations continue to rely on outdated technologies

TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …

Advanced threat detection platform leveraging distributed computing

At the RSA Conference 2015, Damballa unveiled Damballa Failsafe 6.0. This advanced threat detection platform leverages a distributed computing architecture that enables the …

Cloud
Radware launches hybrid cloud based WAF service

Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, …

binary
BlackVault CYNR: Code and document signing appliance

Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …

Consumers think passwords are of no value to criminals

21 percent of respondents to a Kaspersky survey assume their passwords are of no value to criminals. Many often take the easy way out when creating and storing passwords. For …

becrypt tvolution
The portable secure desktop: tVolution Mini

At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart …

Key trends and opportunities in the information security profession

Companies and organizations are increasingly struggling to manage threats, avoid errors and are taking longer to recover from cyberattacks. The results of the (ISC)2 Global …

Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches

Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …

Upatre malware gets full SSL comms encryption

“The extremely popular Upatre Trojan downloader has undergone considerable changes that will make it and its communication more difficult to spot and block. The changes …

Attackers actively downing Microsoft’s IIS web servers

Attackers are actively exploiting a DoS vulnerability (CVE-2015-1635) affecting Microsoft’s Internet Information Services (IIS) extensible web server, SANS ISC CTO …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools