Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
HDD
What the latest data reveals about hard drive reliability

What really counts as a hard drive failure? That’s the question at the center of Backblaze’s Q3 2025 Drive Stats report, which tracks the performance of 328,348 hard drives …

mobile spyware
CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042)

CISA has added CVE-2025-21042, a vulnerability affecting Samsung mobile devices, to its Known Exploited Vulnerabilities (KEV) catalog, and has ordered US federal civilian …

GNU
GNU Coreutils 9.9 brings fixes and updates across essential tools

GNU Coreutils is the backbone of many enterprise Linux environments. It provides the basic file, shell, and text utilities that every GNU-based system depends on. The latest …

zero trust
Attackers exploited another Gladinet Triofox vulnerability (CVE-2025-12480)

Attackers have exploited yet another vulnerability (CVE-2025-12480) in the Gladinet Triofox secure file sharing and remote access platform, Mandiant revealed on Monday. …

Chris Wheeler
To get funding, CISOs are mastering the language of money

In this Help Net Security interview, Chris Wheeler, CISO at Resilience, talks about how CISOs are managing changing cybersecurity budgets. While overall spending is up, many …

Law enforcement
How far can police push privacy before it breaks

Police use drones, body cameras, and license plate readers as part of their daily work. Supporters say these tools make communities safer. Critics see something different, a …

burnout
CISOs are cracking under pressure

Cybersecurity leaders are hitting their limit. A new report from Nagomi Security shows that most CISOs are stretched thin, dealing with nonstop incidents, too many tools, and …

digital supply chain
Hidden risks in the financial sector’s supply chain

When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research suggests the real danger may lie elsewhere. BitSight …

cybersecurity jobs
Cybersecurity jobs available right now: November 11, 2025

Academy Cyber Threat Intelligence Analyst Bridewell | United Kingdom | Hybrid – View job details As an Academy Cyber Threat Intelligence Analyst, you will manage OpenCTI …

Enzoic whitepaper
Download: Strengthening Identity Security whitepaper

Identity threats are escalating. Attackers increasingly exploit compromised credentials, often undetected by organizations, and use social engineering to gain access. Most …

wireless
Wi-Fi signals may hold the key to touchless access control

Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no PINs, no fingerprints. Instead, the system identifies you by …

Andrea Succi
Adopting a counterintelligence mindset in luxury logistics

In this Help Net Security interview, Andrea Succi, Group CISO at Ferrari Group, discusses how cybersecurity is integrated into every aspect of the logistics industry. He …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools