Please turn on your JavaScript for this page to function normally.
Black Hat
Photos: Black Hat USA 2023

Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas and Help Net Security was on-site. The conference featured over 100 selected Briefings, …

Rusty Cumpston
How digital content security stays resilient amid evolving threats

With threats evolving and multiplying, it’s essential to understand how technological advancements can serve as both a challenge and an opportunity to safeguard digital …

malware
Threat intelligence’s key role in mitigating malware threats

Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat …

smartphone
How executives’ personal devices threaten business security

Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to …

Cybersecurity as a global, multi-sector activity with Mihoko Matsubara

Like many leaders in the cybersecurity space, the professional journey of Mihoko Matsubara did not necessarily begin with securing devices or technology. However, once she …

Microsoft 365
Microsoft 365 accounts of execs, managers hijacked through EvilProxy

A phishing campaign leveraging the EvilProxy phishing-as-a-service (PhaaS) tool has been spotted targeting Microsoft 365 user accounts of C-level executives and managers at …

White House
White House launches AI Cyber Challenge to make software more secure

The Biden-Harris Administration has launched a major two-year competition using AI to protect the United States’ most important software, such as code that helps run the …

Shenny Sheth
Learning from past healthcare breaches to fortify future cybersecurity strategies

In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with Shenny Sheth, Deputy …

network
Private network adoption grows as enterprises seek greater control and security

Enterprises are turning to private networks to enhance security and resiliency, according to Spirent. “Private networks are emerging as a viable alternative to traditional …

risk
37% of third-party applications have high-risk permissions

Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a …

Android
Google unveils stronger cellular security for Android 14

Google has revealed new cellular security mitigations that will be available for users and enterprises on its soon-to-be-released Android 14, and announced a new release …

intel
Downfall attacks can gather passwords, encryption keys from Intel processors

A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools