Help Net Security
![rorschach ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/06153556/rorschach-ransomware-400x200.jpg)
Ransomware in 2024: Anticipated impact, targets, and landscape shift
As ransomware continues to be on the rise, we can expect groups to continue to evolve their attacks and operate at a larger scale for bigger profits. This will put …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/08121851/ai-robot-400x200.jpg)
Using AI and automation to manage human cyber risk
Despite advanced security protocols, many cybersecurity incidents are still caused by employee actions. In this Help Net Security video, John Scott, Lead Cybersecurity …
![OpenTofu](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/05111432/opentofu-1400-400x200.jpg)
OpenTofu: Open-source alternative to Terraform
OpenTofu is an open-source alternative to Terraform’s widely used Infrastructure as Code provisioning tool. Previously named OpenTF, OpenTofu is an open and …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/03202314/energy_company-400x200.jpg)
Third-party breaches shake the foundations of the energy sector
90% of the world’s largest energy companies experienced a third-party breach in the past 12 months, according to SecurityScorecard. Powering the global economy and everyday …
![Apiiro ASPM](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/05145653/apiiro-aspm-400x200.jpg)
Product showcase: Apiiro unifies AppSec and SSCS in a deep ASPM
With the rapidly evolving threat landscape and complexity of interconnected applications, identifying real, business-critical application risks is more challenging than ever. …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/06103940/router-400x200.jpg)
21 high-risk vulnerabilities in OT/IoT routers found
Forescout detailed the discovery of 21 new vulnerabilities in OT/IoT routers and open-source software elements. The “SIERRA:21 – Living on the Edge” report features research …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203445/data_analytics1-400x200.jpg)
Three security data predictions for 2024
How do companies protect their digital environments in a world where everything is growing more complex, quickly – data, customer expectations, cyber threats and more? It’s …
![pentesting Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/05074658/pentesting-kubernetes-1400-400x200.jpg)
5 open-source tools for pentesting Kubernetes you should check out
Kubernetes, often called K8s, is an open-source platform designed to automate the deployment, scaling, and operations of containerized applications. Kubernetes has become a …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/21102336/zero-trust-future4-400x200.jpg)
Why zero-trust segmentation is critical for cloud resilience
Nearly all organizations rely on the cloud to store sensitive data and run critical systems. But for many, cloud security hasn’t kept up. 93% agree that zero-trust …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/30082950/artificial_intelligence-1-400x200.jpg)
Businesses gain upper hand with GenAI integration
Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their competition, according to …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26141959/api2-400x200.jpg)
How AI is revolutionizing “shift left” testing in API security
Catching coding errors in API preproduction, before they are spun up and go live is critical in preventing exploitable vulnerabilities. It’s why we’ve seen “shift left” become …
![elections GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/27164948/elections-genai-400x200.jpg)
Exploring the impact of generative AI in the 2024 presidential election
2024 is a presidential election year in the US. 2016 and 2020 both saw impressive increases in attempts to influence voters through crafty propaganda and social media …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?