Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Luke McNamara
The defense industrial base is a prime target for cyber disruption

Cyber threats against the defense industrial base (DIB) are intensifying, with adversaries shifting from traditional espionage toward operations designed to disrupt production …

digital supply chain
Cybersecurity in cross-border logistics operations

In this Help Net Security video, Dieter Van Putte, CTO at Landmark Global, discusses how cybersecurity has become a core part of global supply chain operations. He explains …

SecureClaw
SecureClaw: Dual stack open-source security plugin and skill for OpenClaw

AI agent frameworks are being used to automate work that involves tools, files, and external services. That type of automation creates security questions around what an agent …

industry bubble
OT teams are losing the time advantage against industrial threat actors

In many industrial environments, internet-facing gateways, remote access appliances, and boundary systems sit close enough to production networks that attackers can move from …

Ronit Ghose
Your encrypted data is already being stolen

Quantum computing is often treated as a distant, theoretical cybersecurity issue. According to Ronit Ghose, Global Head, Future of Finance of Citi Institute, that mindset is …

LockBit
LockBit 5.0 ransomware expands its reach across Windows, Linux, and ESXi

The Acronis Threat Research Unit (TRU) has identified a new and significantly enhanced version of the LockBit ransomware, LockBit 5.0, currently being deployed in active …

Microsoft Security Dashboard for AI
Microsoft equips CISOs and AI risk leaders with a new security tool

Microsoft released Security Dashboard for AI in public preview for enterprise environments. The dashboard aggregates posture and real-time risk signals from Microsoft …

John White
Security at AI speed: The new CISO reality

The CISO role has changed significantly over the past decade, but according to John White, EMEA Field CISO, Torq, the most disruptive shift is accountability driven by agentic …

GitHub
In GitHub’s advisory pipeline, some advisories move faster than others

GitHub Security Advisories are used to distribute vulnerability information in open-source projects and security tools. A new study finds that only a portion of those …

CISA
Don’t panic over CISA’s KEV list, use it smarter

In this Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how security …

Brutus
Brutus: Open-source credential testing tool for offensive security

Brutus is an open-source, multi-protocol credential testing tool written in pure Go. Designed to replace legacy tools that have long frustrated penetration testers with …

CISA
Why secure OT protocols still struggle to catch on

Industrial control system networks continue to run on legacy communication protocols that were built for reliability and uptime, not authentication or data integrity. In many …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools