Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
vote
Election systems should be considered critical infrastructure

93 percent of security professionals are concerned about cyber-attacks targeting election infrastructure and data, and 81 percent believe cyber criminals will target election …

smart card
Vulnerabilities in smart card drivers open systems to attackers

Security researcher Eric Sesterhenn of X41 D-SEC GmbH has unearthed a number of vulnerabilities in several smart card drivers, some of which can allow attackers to log into …

Oracle
Critical vulnerability in Oracle Database, patch without delay!

Oracle is urging users to patch their Oracle Database installations to plug a critical security issue that can result in complete compromise of the Oracle Database and shell …

HP faxploit
Criminals can compromise company networks by sending malicious faxes

Check Point has revealed details about the two critical remote code execution vulnerabilities (CVE-2018-5924, CVE-2018-5925) it discovered in the communication protocols used …

hybrid IT
Faster, simpler, smaller, smarter: A cybersecurity dream becomes reality

More ports, same space, faster speeds, simpler deployment, foolproof configuration, fully scalable and a smarter way to protect your network. Sounds like an IT professional’s …

arrows
Week in review: IoT security, cyber hygiene, Social Mapper

Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: ​Choosing your defensive strategy One of the biggest …

mpos
Vulnerabilities in mPOS devices could lead to fraud and theft

Vulnerabilities in mPOS (mobile point-of-sale) machines could allow malicious merchants to defraud customers and attackers to steal payment card data, Positive Technologies …

magnify
Social Mapper: A free tool for automated discovery of targets’ social media accounts

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …

airplane
IoT malware found hitting airplanes’ SATCOM systems

In 2014, IOActive researchers revealed security vulnerabilities they found in the most widely deployed satellite communications terminals and presented potential scenarios …

patch
August Patch Tuesday forecast: Looking ahead after a frustrating July

Approaching August Patch Tuesday, we are supposed to be in the ‘dog days’ of summer where everything slows down. Unfortunately, July was full of CVEs and stability fixes with …

industry
The future of OT security in critical infrastructure

Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. While current advances in OT/ICS cyber security …

Black Hat USA 2018
Photo gallery: Black Hat USA 2018, part 2

Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools