Help Net Security
![network](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11202842/network-lights-400x200.jpg)
Private network adoption grows as enterprises seek greater control and security
Enterprises are turning to private networks to enhance security and resiliency, according to Spirent. “Private networks are emerging as a viable alternative to traditional …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
37% of third-party applications have high-risk permissions
Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07115823/locks-red-400x200.jpg)
Recent ransomware attacks share curiously similar tactics
A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings into the connections between …
![Remote work](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11204151/work_from_home-400x200.jpg)
Why cybersecurity is a blue-collar job
Cybersecurity has witnessed exponential growth in recent years, fueled by the increasing sophistication of cyber threats. As the demand for skilled professionals continues to …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171236/ransomware-2-400x200.jpg)
Data exfiltration is now the go-to cyber extortion strategy
The abuse of zero-day and one-day vulnerabilities in the past six months led to a 143% increase in victims when comparing Q1 2022 with Q1 2023, according to Akamai. Ransomware …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27135730/ransomware_2_27082021-400x200.jpg)
The ransomware rollercoaster continues as criminals advance their business models
Ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023 as a proportion of all malware detections, according to …
![SandboxAQ Sandwich](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02121544/sandboxaq-sandwich-1400-400x200.jpg)
SandboxAQ launches open-source meta-library of cryptographic algorithms
SandboxAQ launched Sandwich, an open-source framework that simplifies modern cryptography management and enables developers to steer their organizations towards cryptographic …
![TSA](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/07101347/tsa-400x200.jpg)
For TSA’s updated Pipeline Security Directive, consistency and collaboration are key
Late last month, the Transportation Security Administration renewed and updated its security directive aimed at enhancing the cybersecurity of oil and natural gas pipelines. …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203453/data_analytics4-400x200.jpg)
Dark web activity targeting the financial sector
In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses threats against the financial sector. Threat actors will …
![computer code](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/18151023/computer_code2-400x200.png)
Seasoned cyber pros are more complacent in their skills than junior staff
Average response time accelerated from 29 to 19 days, from 2021 to 2022, with lessons from Log4j and other high-profile vulnerabilities having a significant impact on urgency …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
Managing human cyber risks matters now more than ever
As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become …
![CIS Elements](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/31102621/cis-elements-400x200.jpg)
How to get started with ongoing configuration assessments
There’s an old adage in business: if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?