Help Net Security
![cybersecurity investments](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/21142945/cybersec_investments-400x200.jpg)
What should investing in cybersecurity look like for a technology organization?
To withstand cyberattacks, businesses must continually update internal systems and avoid hasty tech upgrades that might open the door to attackers. In this Help Net Security …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Is mandatory password expiration helping or hurting your password security?
For decades cybersecurity professionals held tight to the idea that passwords needed to be changed on a regular basis. In recent years, however, organizations such as NIST and …
![Think](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100555/think-400x200.jpg)
Incident responders increasingly seek out mental health assistance
Incident responders are primarily driven by a strong sense of duty to protect others. This responsibility that’s increasingly challenged by the surge of disruptive attacks, …
![Node.js Foundation](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105659/nodejs-400x200.jpg)
HTTP request smuggling vulnerability in Node.js (CVE-2022-35256)
In this Help Net Security video, Austin Jones, Principal Software Engineer at ThreatX, explains what HTTP request smuggling is, and discusses a recently uncovered HTTP request …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/05094040/ecommerce-400x200.jpg)
Financial crises boost fraud rates, making online consumers more cautious
59% of consumers are more concerned about becoming a victim of fraud now than they were in 2021, according to a research released by Paysafe. This Help Net Security video …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01155324/malware_6_01122021-400x200.jpg)
Researchers outline the Lazarus APT offensive toolset
ESET researchers uncovered and analyzed a set of malicious tools that were used by the Lazarus APT group in attacks during the end of 2021. The campaign started with spear …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100217/biohazard-malware-400x200.jpg)
Detecting fileless malware infections is becoming easier
For some analysts, memory analysis is only an optional step in cybersecurity investigations. Their reasons are simple. One: Handling memory and volatile data is a complex …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094558/devsecops1-400x200.jpg)
The impact of DevSecOps practices on software development
A trending practice for application security, DevSecOps includes integrating security early in the software development life cycle (SDLC) and enables the delivery of reliable …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
Why organizations take data sovereignty seriously
According to a Vanson Bourne survey, the vast majority of organizations across France, Germany, the UK, and the US either have sovereignty regulations or policies to keep …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/21163930/microsoft365-city-400x200.jpg)
Many IT pros don’t think a ransomware attack can impact Microsoft 365 data
Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months, according to Hornetsecurity. The 2022 Ransomware Report, which …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: MS Exchange zero-days exploited, AD attack paths, developing secure APIs
SpyCast: Cross-platform mDNS enumeration tool SpyCast is a cross-platform mDNS enumeration tool that can work either in active mode by recursively querying services or in …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
The current state of cloud security
Cloud security became much more complicated as COVID-19 hit and remote/hybrid workforces emerged. Organizations are struggling to sufficiently secure new cloud environments …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality