Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Intel471 handbook
Cyber Underground General Intelligence Requirements Handbook

The Cyber Underground General Intelligence Requirements Handbook (CU-GIRH) is a baseline tool to assist in organizing, prioritizing, producing and measuring production of …

network
Have we put too much emphasis on protecting the network?

Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, …

DRM
How do I select a DRM solution for my business?

Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is …

talk
Nearly 40% of consumers lost money to phone scams in 2020

Businesses and consumers are relying on the voice call more than ever during the pandemic with voice traffic up 184% in 2020 compared to 2019, according to a Hiya report. …

ENISA
Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, …

password
Rampant password reuse puts companies and customers at risk

25.9 million business account credentials and over 543 million breach assets tied to employees in the Fortune 1000 are readily available on the criminal underground, SpyCloud …

finance
CFOs are becoming catalysts of digital strategy

As the pandemic continues to challenge organizations worldwide, the role of chief financial officers (CFOs) has moved further beyond “economic guardians” of the enterprise to …

week in review
Week in review: Improving vulnerability triage, RDP attacks soaring, hackers in high demand

Here’s an overview of some of last week’s most interesting news and articles: Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack Forescout …

broken
Accellion to retire enterprise file-sharing product targeted in recent attacks

U.S.-based cloud solutions company Accellion will soon retire FTA, its legacy enterprise file-sharing solution, vulnerabilities in which have recently been exploited by …

shield
5 cybersecurity trends MSPs must address in 2021

2020 was chock full of surprises and twists that no analyst could have predicted and came with a massive shift to remote working and tools that facilitate it. The good news is …

Phishing
Successful BEC attacks become 56% more costly

The number of phishing attacks grew through 2020, fully doubling over the course of the year. Attacks peaked in October 2020, with a high of 225,304 new phishing sites …

Biohazard
mHealth apps consistently expose PII and PHI through APIs

All of the 30 popular mHealth apps that were tested are vulnerable to API attacks that can allow unauthorized access to full patient records including protected health …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools