What makes airport and airline systems so vulnerable to attack?
In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex …
Cybersecurity jobs available right now: August 19, 2025
Senior Cybersecurity Analyst DOT Security | USA | On-site – No longer accepting applications As a Senior Cybersecurity Analyst, you will lead the investigation of …
New NIST guide explains how to detect morphed images
Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure …
Noodlophile infostealer is hiding behind fake copyright and PI infringement notices
Attackers pushing the Noodlophile infostealer are targeting businesses with spear-phishing emails threatening legal action due to copyright or intellectual property …
How security teams are putting AI to work right now
AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert noise, guide analysts during investigations, and speed up …
Buttercup: Open-source AI-driven system detects and patches vulnerabilities
Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place …
Review: Data Engineering for Cybersecurity
Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the flood of logs, events, and telemetry they collect. About …
Weak alerting and slipping prevention raise risk levels for CISOs
Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft prevention has dropped …
Bridging the AI model governance gap: Key findings for CISOs
While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could slow adoption and increase risk. The findings …
Week in review: 2 threat actors exploiting WinRAR 0-day, Microsoft fixes “BadSuccessor” Kerberos flaw
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: WinRAR zero-day was exploited by two threat actors (CVE-2025-8088) The RomCom …
How military leadership prepares veterans for cybersecurity success
In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans …
Cyber insurance market shows early signs of maturity
The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent research from Arctic Wolf. Brokers and carriers are …
Featured news
Resources
Don't miss
- Trust, friction, and ROI: A CISO’s take on making security work for the business
- Tracking drones with the 5G tower down the street
- North Korean hackers linked to Axios npm supply chain compromise
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)
- Mimecast makes enterprise email security deployable in minutes