Please turn on your JavaScript for this page to function normally.
CIS Controls v8
CIS Critical Security Controls v8

The CIS Critical Security Controls (CIS Controls) are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are …

ransomware
A closer look at ransomware attack patterns

Barracuda released its fourth-annual threat research report which looks at ransomware attack patterns that occurred between August 2021 and July 2022. This Help Net Security …

fire
Reimagining the approach to incident response

Today’s harsh reality is that incident response based on manual efforts is no longer successful for security teams. Staying on top of thousands of daily security alerts …

burn
Outdated infrastructure remains a problem against sophisticated cyberattacks

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …

network
Financial organizations fail to act on firmware breaches

In this Help Net Security video, Michael Thelander, Director Product Marketing at Eclypsium, discusses how financial organizations are failing to act despite the majority …

healthcare
Cybercriminals are changing focus from large hospitals to smaller hospital systems

Critical Insight announced the release of the firm’s H1 2022 Healthcare Data Breach Report, which analyzes ​​breach data reported to the United States Department of Health and …

The challenges of achieving ISO 27001

ISO 27001 is a widely-known international standard on how to manage information security. In this Help Net Security video, Nicky Whiting, Director of Consultancy, Defense.com, …

phishing
Criminals harvest users’ PI by impersonating popular brands

Hornetsecurity released an Email Threat Review, which cited a decline in Excel attacks, but reported a sharp increase in Intuit phishing attacks. This Help Net Security video …

malware
The top apps for malware downloads

In July 2022, one third of all malware downloads came from cloud apps. The overwhelming majority of the downloads were trojans, a type of malware that is disguised as …

Hand
High-profile vulnerabilities encourage organizations to improve security posture

As organizations go about their regular routine of finding and adding new technologies to help increase their overall success, each organization must keep in mind the security …

shield
Defeat social engineering attacks by growing your cyber resilience

In this Help Net Security video, Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions, discusses the innovation behind social engineering campaigns …

iOS 16 security
Apple strengthens security and privacy in iOS 16

Apple announced additional security and privacy updates for its newest mobile operating system. In this Help Net Security video, you’ll learn more about the latest privacy and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools