Help Net Security

Balance reliable online age verification methods with data protection issues
Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable …

Personal cybersecurity is now a company problem
As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the …

API abuses and attacks create new challenges for retailers
Imperva releases The State of Security Within eCommerce 2022 report, a 12-month analysis by Imperva Threat Research of cybersecurity threats targeting the retail industry. …

Red, purple, or blue? When it comes to offensive security operations, it’s not just about picking one color
When people find out that I’ve spent much of my career being hired by companies to steal their secrets, they usually ask, “Are we doing enough? Do we need a red team?” …

Compliance initiatives can advance your organization’s security journey
Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …

Remote work pushes video conferencing security to the fore
IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks capable of impacting video conferencing. In this Help Net …

Security leaders want consequences for insecure code
Organizations plan to invest in DevSecOps in 2023, and the level of urgency for them to do so has grown. In a recent survey conducted by the Neustar International Security …

How ransomware gangs and malware campaigns are changing
Deep Instinct released its 2022 Bi-Annual Cyber Threat Report which focuses on the top malware and ransomware trends and tactics from the first half of 2022 and provides key …

Ransomware is the biggest concern for most organizations
SonicWall released the 2022 SonicWall Threat Mindset Survey which found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused …

2FA, 3FA, MFA… What does it all mean?
Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity …

What is software threat modeling and how to use it effectively
The importance of software threat modeling continues to grow. NIST advises software engineers to adhere to secure software development best practices and do software threat …

Shining a light on the dark web
Dark web marketplaces sell a plethora of tools, stolen data, and forged documents, and some of the things for sale are priced higher than the rest. The most expensive records …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)