Help Net Security

Organizations still vulnerable to brute force attacks
While increases in malware are clearly a major threat to both enterprises and service providers, network complexity is creating its own vulnerability, according to Ixia. The …

Cyber insurance: What and why?
High-profile cyber-attacks are fast becoming the norm in modern society, with 2016 being arguably the worst year for major security breaches. National Crime Agency statistics …

Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …

IoT and the resurgence of PKIs
With the digital revolution in full swing, security methods and models need to be re-evaluated to better address both the changing nature of enterprise architectures and …

Bad bots attack 96% of websites with login pages
Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …

What impact will artificial intelligence have on business?
Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …

Adoption of advanced technology continues quickly despite security gaps
93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …

There’s a chronic shortage of women in information security
A survey of over 19,000 cybersecurity professionals has revealed a chronic shortage of women working in the cybersecurity amid a widening skills gap, with women forming just …

Data breaches: Playing by a new set of rules?
Tell me, what’s your response when you hear that a company that was breached are now losing customers? I suppose it’s at this point the word reasonable makes an appearance. …

Securing document flow: Exploring exposure and risk
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …

Hack In The Box announces keynotes for 2017 Amsterdam event
Hack In The Box announced an exciting line-up for its annual security conference taking place in Amsterdam on April 13th and 14th. Groundbreaking security research covering …

U.S. charges Russian FSB officers for hacking Yahoo, millions email accounts
A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, …
Featured news
Resources
Don't miss
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”