Category: HelpnetSecurity

How to encrypt and secure sensitive files on macOS
17
Mar
2025

How to encrypt and secure sensitive files on macOS

Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized…

GitHub project maintainers targeted with fake security alert
17
Mar
2025

GitHub project maintainers targeted with fake security alert

A phishing campaign targeting GitHub account owners has been trying to scare them with a fake security alert into allowing…

Review: Cybersecurity Tabletop Exercises - Help Net Security
17
Mar
2025

Review: Cybersecurity Tabletop Exercises – Help Net Security

Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop…

IntelMQ: Open-source tool for collecting and processing security feeds
17
Mar
2025

IntelMQ: Open-source tool for collecting and processing security feeds

IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the…

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books
16
Mar
2025

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup…

Quantifying cyber risk strategies to resonate with CFOs and boards
14
Mar
2025

Quantifying cyber risk strategies to resonate with CFOs and boards

In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate…

Top 5 threats keeping CISOs up at night in 2025
14
Mar
2025

Top 5 threats keeping CISOs up at night in 2025

Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and…

94% of Wi-Fi networks lack protection against deauthentication attacks
14
Mar
2025

94% of Wi-Fi networks lack protection against deauthentication attacks

A recent report from Nozomi Networks Labs, based on an analysis of over 500,000 wireless networks worldwide, reveals that only…

New infosec products of the week: March 14, 2025
14
Mar
2025

New infosec products of the week: March 14, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace….

How to secure your personal metadata from online trackers
13
Mar
2025

How to secure your personal metadata from online trackers

When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history….

CISOs, are your medical devices secure? Attackers are watching closely
13
Mar
2025

CISOs, are your medical devices secure? Attackers are watching closely

The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this…

Cybersecurity classics: 10 books that shaped the industry
13
Mar
2025

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and…