Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
DNS
Is DNS a vital component of your security strategy?

Security and risk (S&R) teams often use DNS to detect and block threats early in the kill chain, identify compromised devices, and investigate and respond to malware, an …

attacks
2020: The year of increased attack sophistication

There was an increase in both cyberattack volume and breaches during the past 12 months in the U.S. This has prompted increased investment in cyber defense, with U.S. …

patch
July 2020 Patch Tuesday: Microsoft plugs wormable Windows DNS Server RCE flaw

On this July 2020 Patch Tuesday, Microsoft has plugged 18 critical and 105 high-severity flaws, Adobe has delivered security updates for ColdFusion, Adobe Genuine Service, …

SAP
Critical flaw gives attackers control of vulnerable SAP business applications

SAP has issued patches to fix a critical vulnerability (CVE-2020-6287) that can lead to total compromise of vulnerable SAP installations by a remote, unauthenticated attacker. …

NDR
How do I select a network detection and response solution for my business?

Network detection and response (NDR) solutions enable organizations to improve their threat response, they help protect against a variety of threats, and also provide …

Biohazard
Ransomware, then and now: The change in data theft behavior

The rising number of people working from home have left more businesses at risk from ransomware than ever before. Gaps in network security, shadow IT and a greater reliance on …

BGU Zoom research
Researchers extract personal data from video conference screenshots

Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to Ben-Gurion University of the Negev researchers, …

account
Remote working security challenges urge MFA implementation

The past few years have seen an increase in employees using personal devices and systems to access work emails and company databases, and exchange valuable information with …

HITBSecConf 2020
HITB Lockdown: Hands-on technical trainings coming next week!

HITB Lockdown 002 will feature a number of hands-on technical trainings, taking place July 20-23, 2020. 2-day trainings Advanced ICS Hacking Trainer: Yamila Levalle (Security …

hunt
Cyberwarfare: The changing role of force

Novel malware, computer code and clandestine digital access are some of the unconventional weapons various countries are currently amassing and deploying. Whether used as a …

people
Security alerts more than doubled in the last 5 years, SecOps teams admit they can’t get to them all

Sumo Logic announced the findings of a global survey that highlight the barriers security professionals are facing on the path to modernizing the security operations center …

structure
Week in review: MongoDB attacks, hackers hitting F5 BIG-IP, Citrix devices, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and reviews: Attackers are probing Citrix controllers and gateways through recently …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools