Help Net Security
![cybersecurity documentaries](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/01105354/cybersecurity_documentaries-400x200.jpg)
8 free cybersecurity documentaries you can watch right now
The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can often feel esoteric, leaving …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
Budget constraints threaten cybersecurity in government bodies
Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat …
![ransomware payments](https://img.helpnetsecurity.com/wp-content/uploads/2021/06/16110606/ransomware_payments-400x200.jpg)
Navigating the gray zone of ransomware payment practices
Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152649/chain4-400x200.jpg)
Unraveling the importance of software supply chain security
The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184416/week-in-review2-400x200.jpg)
Week in review: AWS SSM agents as RATs, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Open-source penetration testing tool BloodHound CE released SpecterOps …
![patch tuesday](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12093102/patch-tuesday-yellow-400x200.jpg)
August 2023 Patch Tuesday forecast: Software security improvements
August 2023 Patch Tuesday: Microsoft fixes critical bugs in Teams, MSMQ The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200048/biometrics2-400x200.jpg)
Multi-modal data protection with AI’s help
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos and risk much like …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: August 4, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar, SpecterOps, Synopsys, Traceable AI, and …
![VPN](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02120400/vpn-tunnel-400x200.jpg)
VPNs remain a risky gamble for remote access
Organizations are expressing deep concerns about their network security due to the risks from VPNs, according to a new Zscaler report. The report stresses the need for …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142725/cloudfiles2-400x200.jpg)
IaaS networking services revenue to hit $19.4 billion in 2023
The importance of networking to and within cloud environments has grown significantly for enterprise customers as more and more applications, workloads, and data are moved to …
![crypto currency](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101455/crypto_currency2-400x200.jpg)
7 fake cryptocurrency investment apps discovered in Google Play, Apple App Store
Sophos released new findings on CryptoRom scams—a subset of pig butchering schemes designed to trick users of dating apps into making fake cryptocurrency investments. Since …
![CNAPPgoat](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02083619/cnappgoat-1400-400x200.jpg)
Assess multi-cloud security with the open-source CNAPPgoat project
Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?