Product showcase: Smarter pentest reporting and exposure management with PlexTrac
02
Jun
2025

Product showcase: Smarter pentest reporting and exposure management with PlexTrac

The threat landscape is evolving faster than ever. Staying ahead means going beyond automated scans and check-the-box assessments. It demands…

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
02
Jun
2025

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called Netbird to target…

Conducting Risk Assessments That Drive Business Value
02
Jun
2025

Conducting Risk Assessments That Drive Business Value

Companies across industries are discovering that well-executed risk assessments do far more than check regulatory boxes—they’re becoming powerful engines for…

CISO 3.0: Leading AI governance and security in the boardroom
02
Jun
2025

CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role…

Synology Premiers a Full Lineup of Advanced Data Management Solutions at COMPUTEX 2025, Engages ANZ Partners on Regional Strategy
02
Jun
2025

Synology Premiers a Full Lineup of Advanced Data Management Solutions at COMPUTEX 2025, Engages ANZ Partners on Regional Strategy

Taipei, Taiwan – May 22, 2025 – Synology is showcasing its latest lineup of innovations at COMPUTEX 2025, presenting a…

Blockchain for Cybersecurity Real-World Applications and Limits
02
Jun
2025

Blockchain for Cybersecurity Real-World Applications and Limits

As cybercrime costs the global economy an estimated $445 billion annually, blockchain technology is emerging as a powerful cybersecurity weapon…

Print Friendly, PDF & Email
02
Jun
2025

Journal of Cyber Security and Mobility – Best Paper Awards

We are very pleased to announce the Best Paper Awards from the Journal of Cyber Security and Mobility! The Journal…

Review: Metasploit, 2nd Edition - Help Net Security
02
Jun
2025

Review: Metasploit, 2nd Edition – Help Net Security

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit…

Evolution of DDoS Attacks Mitigation Strategies for 2025
02
Jun
2025

Evolution of DDoS Attacks Mitigation Strategies for 2025

The cybersecurity landscape witnessed an unprecedented escalation in distributed denial of service (DDoS) attacks during the first quarter of 2025….

48% of security pros are falling behind compliance requirements
02
Jun
2025

48% of security pros are falling behind compliance requirements

32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile,…

Critical Linux Vulnerabilities Expose Password Hashes on Millions Linux Systems Worldwide
02
Jun
2025

Critical Linux Vulnerabilities Expose Password Hashes on Millions Linux Systems Worldwide

Two critical local information-disclosure vulnerabilities affecting millions of Linux systems worldwide, potentially allowing attackers to extract sensitive password data through…

Breaking Down Silos Aligning IT and Security Teams
02
Jun
2025

Breaking Down Silos Aligning IT and Security Teams

A growing crisis is emerging in corporate cybersecurity operations, where organizational silos between IT and security teams are creating dangerous…