Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
arrows
Hackers changing tactics, techniques and procedures

Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 …

SaaS
SMB security: The evolving role of SaaS and IT outsourcing

SMBs need to bridge the gap between smaller IT security budgets and a shortage of expertise to face the very real and growing threat of cyber attacks, according to Kaspersky …

IP Vanish VPN
IPVanish VPN unveils new app, security improvements

US-based IPVanish VPN, whose VPN network spans 40,000+ IPs on 500+ servers in 60+ countries, has recently pushed out a major new edition of its app. The new version (v3.0) has …

Study Guide 70-410
Study Guide: Installing and Configuring Windows Server 2012

This Study Guide covers Microsoft’s 70-410 “Installing and Configuring Windows Server 2012” exam. It’s the first exam of three exams that make up the …

watch
Top 10 strategic predictions for IT organizations and users

Gartner revealed its top predictions for 2017 and beyond, which examine three fundamental effects of continued digital innovation: experience and engagement, business …

abstract, generic
Week in review: DNS DDoS, Linux kernel zero-day, VeraCrypt audited

Here’s an overview of some of last week’s most interesting news, reviews and articles: Dirty COW Linux kernel zero-day exploited in the wild is now patched Linux …

connection
Major US DNS provider hit with DDoS, part of the Internet becomes unreachable

US-based DNS provider Dyn has suffered a massive DDoS attack earlier today, and it resulted in many websites being completely or intermittently inaccessible for a few hours. …

Linux
Dirty COW Linux kernel zero-day exploited in the wild is now patched

Linux developer Phil Oester has spotted attackers exploiting a Linux kernel zero-day privilege escalation flaw that dates back to 2007, and has raised the alarm. The …

Weebly
43+ million users affected by confirmed Weebly breach

Weebly, a popular web-hosting service featuring a drag-and-drop website builder, has been breached, and email addresses/usernames, IP addresses and encrypted passwords for …

3d printing
Hacking 3D manufacturing systems demonstrated by researchers

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a …

Chaos Monkey
Use Chaos Monkey to push engineers to build resilient cloud services

Netflix’s engineering team is good at sharing the tools they create, and keeping them updated to serve different needs. Chaos Monkey is the latest offering that received …

deep web
How cybercriminals attack homes, and how to stop them

At a recent Home Hacker Lab event, an ethical hacker revealed how cybercriminals attack, and what consumers can do to protect themselves. The October 13 workshop in New York …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools