Help Net Security
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105434/idea-400x200.jpg)
A picture is worth a thousand words, but to hackers, it’s worth much more
Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Exploiting common URL redirection methods to create effective phishing attacks
“Simple” can often be harder than “complex.” When thinking about the trickiest phishing campaigns and their components, URL redirection does not immediately come to mind as …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100610/windows-400x200.jpg)
Defending against Windows RDP attacks
In 2020, attacks against Windows Remote Desktop Protocol (RDP) grew by 768%, according to ESET. But this shouldn’t come as a surprise, given the massive increase in the number …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195645/Bitcoin-400x200.jpg)
Bitcoin Security Rectifier app aims to make Bitcoin more secure
A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
DX projects hindered by lack of collaboration between security and networking teams
Netskope revealed a research showing a significant breakdown in collaboration between two of the central components of the IT team: networking and security. While 49% of …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
Getting a grip on basic cyber hygiene
We know that good “hygiene” is conducive to good health and cleanliness. And, if you’re reading this blog it’s safe to say that you’re familiar with the term “cyber” as it …
![Cynet CISO Challenge](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/09095209/cynet-ciso_challenge-400x200.png)
New competition allows cybersecurity leaders to test their knowledge and skills
What can security leaders do to make sure they’re prepared and hone their skills ahead of the next inevitable threat? Now, they can test themselves and their knowledge at a …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: Patch Tuesday forecast, how to select a DLP solution, is it OK to publish PoC exploits?
Here’s an overview of some of last week’s most interesting news, articles and interviews: 21 vulnerabilities found in Exim, update your instances ASAP! A code audit of Exim, a …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092933/insider_threat-1-400x200.jpg)
The obvious and not-so-obvious data you wouldn’t want companies to have
What types of data are companies collecting, and when does it stop serving us? Value exchange: The ultimate differentiator First, let’s start by assessing the process of …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08184743/patch_bkg3-400x200.jpg)
May 2021 Patch Tuesday forecast: Spring cleaning is in order
There’s an event referred to as spring cleaning, where we take some time from our regular routines to focus on bringing order back to our homes. We remove the junk that has …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103433/architecture-400x200.jpg)
Be a “dumbass”, like some of the world’s best cyber investigators
One of my closest friends in the cybersecurity industry has had a second-to-none career path. While in the employ of an industry leader in incident response, he was …
![Salesforce](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/08142813/salesforce-400x200.jpg)
Acting on a security risk assessment of your organization’s use of Salesforce
Salesforce isn’t rocket science, but the software has an incredible array of tools, which is why securing it demands a unique (and sometimes complex) approach. If you’re …
Featured news
Sponsored
Don't miss
- The changes in the cyber threat landscape in the last 12 months
- The CISO’s approach to AI: Balancing transformation with trust
- 10 fintech companies to watch in 2024
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data