Help Net Security
![social engineering attacks](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/17162548/social_engineering_attacks-400x200.jpg)
Social engineering attacks anybody could fall victim to
Social engineering – also known as human hacking – is an expression that encompasses a number of methods and vectors attackers use to manipulate targets into …
![Shadowserver](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/16152923/shadowserver-1600-400x200.jpg)
Shadowserver: Get free access to timely, critical Internet security data
The Shadowserver Foundation fulfills a unique role in the cybersecurity ecosystem by supplying vital security information to Internet defenders and law enforcement at no cost. …
![cert-manager](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/13101902/cert-manager-400x200.jpg)
cert-manager: Automatically provision and manage TLS certificates in Kubernetes
cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters and simplifies the process of obtaining, renewing, and using those …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/03132545/opensource-400x200.jpg)
Consumer behaviors are the root of open source risk
Sonatype unveiled its eighth annual State of the Software Supply Chain Report which, in addition to a massive surge in open source supply, demand, and malicious attacks, found …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: CISA releases RedEye, Apache Commons Text flaw, Medibank data breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Medibank hack turned into a data breach: The attackers are demanding money …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
Data visualization: An invaluable tool in a defender’s arsenal
Visibility is always a priority, but it’s vital when responding to an incident. Time is always working against incident responders. Looking through rows of text data and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/07124918/supply_chain_security-1-400x200.jpg)
How supply chain threats will evolve in 2023
Software supply chain risk has grown to be a significant concern for organizations as cyber attackers look to take advantage of the accelerating digitalization that has seen …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/10142333/phishing_red-hns2-400x200.jpg)
How phishing campaigns abuse Google Ad click tracking redirects
PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101103/data-400x200.jpg)
The companies most likely to lose your data
Web companies are most likely to lose your data, a study shows. The study, conducted by VPN Overview, analysed major data breaches that have been registered since 2004 to …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095753/work-400x200.jpg)
(ISC)² to aid cybersecurity professional development in emerging economies
(ISC)² has signed a Memorandum of Understanding (MOU) with the Korea Internet & Security Agency (KISA) to strenghten cybersecurity professional development in emerging …
![risk assessment](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/17115906/risk-assessment-400x200.jpg)
Why chasing risk assessments will have you chasing your tail
Third-party risk assessments are often described as time-consuming, repetitive, overwhelming, and outdated. Think about it: organizations, on average, have over 5,000 third …
![ImmuniWeb Discovery](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/18170038/immuniweb_discovery-400x200.jpg)
Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring
Organizations around the globe struggle to identify their IT assets hosted in a multicloud environment, on premise or managed by numerous third parties. The lack of visibility …