Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
abstract
Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released …

Office 365
Office 365 users targeted by phishers employing simple HTML tricks

Phishers are using a simple but effective trick to fool Microsoft’s NLP-based anti-phishing protections and Office 365 users into entering their login credentials into …

ExtraHop Reveal(x)
New infosec products of the week​: June 22, 2018

ExtraHop Reveal(x) sheds light on the darkspace ExtraHop announced Reveal(x) Summer 2018. The latest release includes new capabilities designed to modernize enterprise …

bomb
Banking Trojans and cryptojacking on the rise

A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth …

Red door
Unrestricted access to systems and files exposes organizations to cybercrime

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …

Cisco
Cisco plugs critical flaws in many switches, security appliances

Cisco has released security updates to address a bucketload of vulnerabilities affecting multiple products, including 24 critical and high-severity flaws found in many of its …

gap
Could an Equifax-sized data breach happen again?

Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), …

laptop
Endpoint security automation a top priority for IT pros

A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around …

trend
Major trends in app development, agile/DevOps maturity, and low-code adoption

Digital transformation dominates business strategy today, which is why web and mobile development demand is booming. Moreover, speed and agility are more important than ever …

future
Disruptive technologies in fintech to watch

Juniper Research has revealed the top 10 technologies set to disrupt the fintech industry in 2018 and 2019. New research found a wealth of positive changes stemming from …

Google Play
Google lays groundwork for secure offline app distribution

Google will start adding security metadata to Android application packages (APKs) distributed via Google Play, so that users with limited internet access can check whether the …

Idea
Execs don’t believe their companies learn the right lessons in cybersecurity

A majority of executives around the world feel their organizations can do better when it comes to learning from their past cyber mistakes, according to the results of a newly …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools