Help Net Security
Russian APT group actively exploiting Flash, Windows 0-day flaws
APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an “international government entity …
Organizations continue to rely on outdated technologies
TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …
Radware launches hybrid cloud based WAF service
Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, …
Five misunderstandings about cloud storage
Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is …
BlackVault CYNR: Code and document signing appliance
Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …
The portable secure desktop: tVolution Mini
At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart …
Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches
Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …
How IT pros protect and investigate their endpoints
More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. …
1 in 4 employees enable cloud attacks
While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, …
Security analytics: The key for breach detection?
Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced …
IBM unveils cyber threat intelligence sharing platform
IBM is making its vast library of security intelligence data available via the IBM X-Force Exchange, a new cyber threat intelligence sharing platform powered by IBM Cloud. …
Internet of Everything attack surface grows
The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month