Please turn on your JavaScript for this page to function normally.
Interactive Brokers
Scammers are impersonating Interactive Brokers: Here’s what you need to know

Interactive Brokers is warning customers to be on high alert due to a wave of scams involving fraudsters posing as company representatives. Interactive Brokers (IBKR) is a …

William Lyne
How global collaboration is hitting cybercriminals where it hurts

In this Help Net Security interview, William Lyne, Deputy Director of UK’s National Crime Agency, discusses the cybercrime ecosystem and the threats it enables. He …

Vet
Vet: Open-source software supply chain security tool

Vet is an open source tool designed to help developers and security engineers spot risks in their software supply chains. It goes beyond traditional software composition …

CISO
Bankers Association’s attack on cybersecurity transparency

A coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made …

development vs. security
Development vs. security: The friction threatening your code

Developers are driven to deliver new features quickly, while security teams prioritize risk mitigation, which often puts the two at odds. 61% of developers said that it’s …

cybersecurity jobs
Cybersecurity jobs available right now: June 3, 2025

CISO Halan Microfinance Bank | Pakistan | On-site – View job details As a CISO, you will develop and implement a comprehensive information security strategy aligned with …

ConnectWise
Attackers breached ConnectWise, compromised customer ScreenConnect instances

A suspected “sophisticated nation state actor” has compromised ScreenConnect cloud instances of a “very small number” of ConnectWise customers, the …

PlexTrac
Product showcase: Smarter pentest reporting and exposure management with PlexTrac

The threat landscape is evolving faster than ever. Staying ahead means going beyond automated scans and check-the-box assessments. It demands continuous, hands-on testing …

Aaron McCray
CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic …

Metasploit, 2nd Edition
Review: Metasploit, 2nd Edition

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book in line with how …

cybersecurity awareness
Security awareness training isn’t stopping breaches. Can AI help?

In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of …

video supply chain security
48% of security pros are falling behind compliance requirements

32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools