Help Net Security

Hidden in plain sight: Four signs your network might be under attack
It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even …

Online transaction fraud to reach $25 billion by 2020
Online transaction fraud is expected to reach $25.6 billion by 2020, up from $10.7 billion last year, according to Juniper Research. This means that by the end of the decade, …

Free badge program helps determine the security of open source software
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that aims to improve the security of critical open source projects, issued its first round …
Gozi malware creator sentenced to time served
Nikita Kuzmin, the creator of the Gozi malware, was sentenced on Monday in Manhattan federal court to time served (37 months). He was also ordered to pay nearly $7 million in …

Cybercriminals filtering out victims by location
There’s a growing trend among cybercriminals to target and even filter out specific countries when designing ransomware, according to SophosLabs. To lure more victims …

Third party risk on the rise, risk mitigation still not a priority
Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …

Europol to get new powers to disrupt terrorists’ online presence
The EU police agency Europol is expected to gain new powers that will help it fight terrorism and cybercrime, thanks to new governance rules endorsed by Civil Liberties …

Security startup confessions: Choosing a tech partner
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Living in a password free world in the modern enterprise
The era of password security in the modern enterprise is over. Passwords are dead. Let’s be honest. Passwords in the enterprise were never really that secure in the …

US companies need to gear up for new EU data privacy regulations
Thousands of American companies that do business in Europe directly or online with European customers will need to start reckoning with new EU data privacy regulations that …

Week in review: Top 10 web hacking techniques, exploit kit targets Android devices
Here’s an overview of some of last week’s most interesting news, reviews and articles: US Supreme Court approves expansion of FBI hacking powers The US Supreme …

Pro-ISIS hackers: Tactics, methodology and tools
While the threat that emanates from ISIS-inspired cyber attacks is of high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)