Help Net Security
Moving toward a more adaptable and tech-driven compliance function
A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of …
Week in review: Account pre-hijacking, Sigstore, ransomware still winning
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomHouse: Bug bounty hunters gone rogue? A new cybercrime outfit that …
How to eliminate the weak link in public cloud-based multi-party computation
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …
What is keeping automotive software developers up at night?
Perforce Software released the results of its annual State of Automotive Software Development survey conducted in partnership with Automotive IQ. Close to 600 automotive …
80% of consumers prefer ID verification when selecting online brands
Jumio released the findings of its global research conducted by Opinium, which shows the impact of the increasing use of digital identity on consumer preferences and …
Hijacking of popular ctx and phpass packages reveals open source security gaps
The Python module “ctx” and a fork of the PHP library “phpass” have recently been modified by an unknown attacker to grab AWS credentials/keys and send …
When it comes to remote work, 71% of IT leaders say security is the main challenge
Workspot announced a survey report which reveals that in the past year, due to remote work, 83% of IT leaders expanded or accelerated their cloud strategies, while still …
Sigstore: Signature verification for protection against supply chain attacks
Software supply chain attacks have been increasing over the past few years, spurring the Biden administration to release an executive order detailing what government agencies …
Review: Hornetsecurity 365 Total Protection Enterprise Backup
Hornetsecurity 365 Total Protection Enterprise Backup is a cloud-based data protection and security solution that provides protection against spam, malware, and other advanced …
Why are current cybersecurity incident response efforts failing?
Business-critical applications, such as enterprise resource planning (ERP) systems provided by SAP and Oracle, are considered the crown jewels of the enterprise. These assets …
Most organizations do not follow data backup best practices
Apricorn announced new findings from a survey, which revealed that while the majority organizations have data backup plans in place, data for many are at risk. Nearly 400 …
How confident are companies in managing their current threat exposure?
Crossword Cybersecurity has released a report based on the findings of a survey of over 200 CISOs and senior UK cyber security professionals. The paper reveals companies are …
Featured news
Resources
Don't miss
- Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
- Workplace stress in 2026 is still worse than before the pandemic
- NIST admits defeat on NVD backlog, will enrich only highest-risk CVEs going forward
- Anthropic releases Claude Opus 4.7 with automated cybersecurity safeguards
- Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug