Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
sport
When the Olympics connect everything, attackers pay attention

Global sporting events bring a surge of network traffic, new systems, and short term partnerships. That mix draws attention from cyber threat actors who see opportunity in …

cyber risks
Cyber risk keeps winning, even as AI takes over

Cyber risk continues to dominate global business concerns, with AI rising quickly alongside it. According to a new risk survey from Allianz, both are influencing how …

AI
As AI raises the stakes, app modernization and security are becoming inseparable

Security leaders are under pressure to support AI programs that move from pilots into production. New Cloudflare research suggests that success depends less on experimentation …

artificial intelligence
New intelligence is moving faster than enterprise controls

AI is being integrated into core enterprise systems faster than many organizations can secure and govern it. A new global study from NTT shows companies expanding AI …

dev
Who’s on the other end? Rented accounts are stress-testing trust in gig platforms

Fraud has become a routine part of gig work for many earners, and the ways workers respond are creating new security problems for platforms. A recent TransUnion study of U.S. …

Infosec products of the week
New infosec products of the week: January 16, 2026

Here’s a look at the most interesting products from the past week, featuring releases from Acronis, JumpCloud, Noction, and SpyCloud. Acronis Archival Storage brings …

CISO
CISOs flag gaps in third-party risk management

Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger role in business operations. A recent …

investment
Cybersecurity spending keeps rising, so why is business impact still hard to explain?

Cybersecurity budgets keep climbing, but many security leaders still struggle to explain what that spending delivers to the business. A new study by Expel examines that …

zero trust
The NSA lays out the first steps for zero trust adoption

Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users, and real data. Many organizations are still sorting …

Orbot for iOS
Product showcase: Orbot – Tor VPN for iOS

Orbot for iOS is a free, open-source networking tool that routes supported app traffic through the Tor network. Developed by the Guardian Project, it is intended for users who …

Proton Lumo
Proton expands Lumo AI assistant with encrypted, project-based workspaces

Lumo is Proton’s AI assistant, built with a focus on privacy and user control. It runs on Proton’s infrastructure and is designed so conversations are not used to train models …

Wine
Wine 11 brings major architectural work, synchronization changes, 600+ bug fixes

Wine, originally short for “Wine Is Not an Emulator,” is a compatibility layer that allows Windows applications to run natively on POSIX-compliant operating systems, including …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools