Maltrail: Open-source malicious traffic detection system
Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available …
Building trust in AI-powered security operations
In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He …
The diagnosis is in: Mobile health apps are bad for your privacy
Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without …
The power grid is getting old, and so is the cybersecurity protecting it
Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, …
What if your privacy tools could learn as they go?
A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how data is distributed, even when that information is incomplete. …
The solar power boom opened a backdoor for cybercriminals
Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in …
Security validation: The key to maximizing ROI from security investments
Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern enterprise’s cyber defenses. …
What Chat Control means for your privacy
The EU’s proposed Chat Control (CSAM Regulation) aims to combat child sexual abuse material by requiring digital platforms to detect, report, and remove illegal content, …
Cybersecurity jobs available right now: October 14, 2025
Cyber Security Analyst I First Citizens Bank | USA | Remote – No longer accepting applications As a Cyber Security Analyst, you will be responsible for developing skills …
Building a healthcare cybersecurity strategy that works
In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He …
AI-generated images have a problem of credibility, not creativity
GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada …
The five-minute guide to OT cyber resilience
In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote …
Featured news
Resources
Don't miss
- LockBit 5.0 ransomware expands its reach across Windows, Linux, and ESXi
- Microsoft equips CISOs and AI risk leaders with a new security tool
- OpenClaw creator Peter Steinberger joins OpenAI
- Google patches Chrome vulnerability with in-the-wild exploit (CVE-2026-2441)
- Security at AI speed: The new CISO reality