Help Net Security
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27102008/ransomware_1_26082021-400x200.jpg)
Stronger ransomware protection finally pays off
60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest research from Hornetsecurity. Businesses acknowledge …
![irreducibly complex systems book](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/06112329/book-irreducibly_complex_systems-400x200.jpg)
Introducing the book: Irreducibly Complex Systems
In this Help Net Security video interview, David Hunt, CTO at Prelude, discusses his book – Irreducibly Complex Systems: An Introduction to Continuous Security Testing. …
![bots](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10164710/bad_bots2-400x200.jpg)
AI-enabled bots can solve CAPTCHAs faster than humans
Companies are losing revenue in the fight against malicious bot attacks, according to survey by Kasada. Despite spending millions of dollars on traditional bot management …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24130337/cyber_insurance-1-400x200.jpg)
Keeping up with the demands of the cyber insurance market
Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into …
![Yeti](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/09181447/yeti_threat_intelligence-1400-400x200.jpg)
Yeti: Open, distributed, threat intelligence repository
Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200747/eye-cyborg-400x200.jpg)
As biohacking evolves, how vulnerable are we to cyber threats?
Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to …
![leaders](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29083640/leaders1-400x200.jpg)
Cybersecurity should be a business priority for CEOs
74% of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack – even though 96% of CEOs said that …
![Microsoft 365 security training](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/09131239/microsoft_365_security_training-1400-400x200.jpg)
15 free Microsoft 365 security training modules worth your time
Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
How cyber fusion is helping enterprises modernize security operations
In this Help Net Security video, Avkash Kathiriya, Sr. VP – Research and Innovation at Cyware, explains how cyber fusion is helping enterprises modernize their security …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171231/malware-400x200.jpg)
Endpoint malware attacks decline as campaigns spread wider
In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are …
![CIS Hardened Images](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/16113018/cis_hardened_images-400x200.jpg)
Cloud security and functionality: Don’t settle for just one
Cloud security is important to you, but that doesn’t mean you’re willing to trade security for functionality. You need security to work for you. Whatever cloud security …
![CVE-2023-44487](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/10150116/http2rapidreset-400x200.jpg)
Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487)
Cloudflare, Google, and Amazon AWS revealed that a zero-day vulnerability in the HTTP/2 protocol has been used to mount massive, high-volume DDoS attacks, which they dubbed …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?