Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
npm
How threat actors are using npm to launch attacks

WhiteSource released a threat report based on malicious activity found in npm, the most popular JavaScript package manager used by developers worldwide. The report is based on …

Biohazard
Exposed corporate credentials threatening the pharma sector

Constella Intelligence released a report which includes new and additional findings pertaining to exposures, breaches, and leakages within the pharma sector, specifically …

bank
Bank executives mostly concerned about cybercrime

A research released by Computer Services suggests growing concerns among bank executives around recruiting and retaining talent as well as fighting cybercrime threats. In the …

Code review: How satisfied are development teams?

Code review remains the biggest influence on improving code quality with unit testing a distant second, a SmartBear survey reveals. With development teams getting larger and …

Pirate flag
Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads

Akamai released a research detailing the persistence of online piracy. The evolving piracy landscape, according to the U.S. Chamber of Commerce’s Global Innovation …

hands
Database security market to reach $16,273.8 million by 2028

The database security market is expected to reach $16,273.8 million by 2028 from $5,751.7 million in 2020; it is estimated to grow at a CAGR of 14.3% from 2021 to 2028, …

Cisco
Cisco plugs critical holes in small business routers

Cisco has patched 14 vulnerabilities affecting some of its Small Business RV Series routers, the worst of which may allow attackers to achieve unauthenticated remote code …

lens
AI technology is redefining surveillance

Surveillance today is narrowly defined as “continuous observation of a place, person, group, or ongoing activity in order to gather information,” especially when the subject …

phishing
People working in IT related roles equally susceptible to phishing attempts as the general population

Phishing emails that mimic HR announcements or ask for assistance with invoicing get the most clicks from recipients, according to a study from F-Secure. The study, which …

hunt
How organizations are arming themselves to combat threats

Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …

collaboration
How are collaboration apps fairing in remote work environments?

Despite a gradual return to the office, be it on a hybrid or full-time basis, apps and tools that support remote work have continued to experience fast growth, according to …

CCPA
Companies woefully unprepared for CCPA compliance

Only 11% of companies are able to fully meet CCPA requirements, especially when managing Data Subject Access Requests (DSARs), according to a CYTRIO research. The research …

Don't miss

Cybersecurity news