Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
GitHub
Network of ghost GitHub accounts successfully distributes malware

Check Point researchers have unearthed an extensive network of GitHub accounts that they believe provides malware and phishing link Distribution-as-a-Service. Set up and …

Crowdstrike
CrowdStrike blames buggy testing software for disastrous update

A bug in the Content Validator – a software element CrowdStrike relies on for testing and validating Rapid Response Content updates for its Falcon Sensors – is …

Karthik Swarnam
Cybersecurity ROI: Top metrics and KPIs

In this Help Net Security interview, Karthik Swarnam, Chief Security and Trust Officer at ArmorCode, discusses key metrics and KPIs to measure cybersecurity ROI. Swarnam …

Infisical
Infisical: Open-source secret management platform

Infisical is an open-source secret management platform developers use to centralize application configurations and secrets, such as API keys and database credentials, while …

cybersecurity jobs
Cybersecurity jobs available right now: July 24, 2024

Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here. Applied Cryptographer Quantstamp | EMEA | Remote …

vulnerability
AI accelerates code development faster than security teams can keep up

91% of respondents say their security budget is increasing this year, demonstrating a growing recognition of the importance of cybersecurity within organizations, according to …

cybersecurity threats
The changes in the cyber threat landscape in the last 12 months

When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. …

EvilVideo Telegram
Vulnerability in Telegram app for Android allows sending malicious files disguised as videos

ESET researchers discovered a zero-day exploit, which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from …

executive
The CISO’s approach to AI: Balancing transformation with trust

As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are …

Fintech companies
10 fintech companies to watch in 2024

The fintech market is experiencing a swift transformation driven by emerging technologies like Open Finance and GenAI, as highlighted by Juniper Research. This evolution is …

SaaS
Despite economic uncertainty, organizations are prioritizing SaaS security investments

In this Help Net Security video, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the key findings of their recent annual SaaS Security Survey Report, conducted in …

Anand Pashupathy
Confidential AI: Enabling secure processing of sensitive data

In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools