Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
vintage computer
IT chiefs keep obsolete systems running just to keep data accessible

89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …

Cisco
Cisco ASA and Firepower flaw exploited in the wild

A high-severity vulnerability affecting Cisco ASA and Firepower security appliances is being exploited in the wild after an exploit has been released online on Friday. …

Windows certificate
Underground vendors can reliably obtain code signing certificates from CAs

More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of using stolen (compromised) ones, …

Wi-Fi
WPA3: Next generation of Wi-Fi security now available

Wi-Fi Alliance introduced Wi-Fi CERTIFIED WPA3, the next generation of Wi-Fi security, bringing new capabilities to enhance Wi-Fi protections in personal and enterprise …

DDoS
Bot-driven credential abuse, DDoS attacks continue to rise

Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …

Microsoft Azure security
Microsoft offers new Azure AD tool to nix easily guessed passwords

Predictable, easy-to-guess passwords are often the weak link that ends up breaking the security chain and attackers know this. “They know to account for character …

hand
Digital transformation: Insight into getting it right

If digital transformation (DX) is using digital technologies to create new business models and change markets, then the journey has only just begun, according to IDC. The …

HMRC
HMRC collected voiceprints of 5.1 million UK taxpayers

Her Majesty’s Revenue and Customs (HMRC) has collected voiceprints of some 5.1 million UK taxpayers without their explicit consent, and won’t reveal whether these …

BEC scams
Losses due to BEC scams are escalating

Despite falling down on the list of most often reported Internet-facilitated crimes, Business Email Compromise/Email Account Compromise is still the type of crime that results …

No Starch Press
For the love of a good IT book: The No Starch Press story

When No Starch Press founder Bill Pollock decided that his new venture would go for quality instead of quantity, he made the right choice. “We haven’t had a down …

sharing
Digital transformation: Visibility compliance in a transitional world

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses digital transformation challenges, and illustrates what an organization has to do …

cloud complexity
Worldwide cloud IT infrastructure revenues continue to grow

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 45.5% year over year in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools