www.helpnetsecurity.com
Open in
urlscan Pro
54.244.7.41
Public Scan
Submitted URL: http://www.helpnetsecurity.com/
Effective URL: https://www.helpnetsecurity.com/
Submission: On May 22 via manual from PH — Scanned from DE
Effective URL: https://www.helpnetsecurity.com/
Submission: On May 22 via manual from PH — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1684764679"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus * News * Features * Expert analysis * Videos * Reviews * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * BLACKLIST UNTRUSTWORTHY APPS THAT PEEK BEHIND YOUR FIREWALL * TP-Link routers implanted with malicious firmware in state-sponsored attacks * Google Cloud CISO on why the Google Cybersecurity Certificate matters * Preparing for federal supply chain security standardization * KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784) * 3 tips to accelerate zero trust adoption * Attack automation becomes a prevalent threat against APIs * Is human threat hunting a fool’s errand? DOWNLOADS * CIS Benchmarks * eBook: Security Compliance for CISOs WIRELESS BROADBAND ALLIANCE CEO ON KEY DRIVERS FOR WI-FI ADOPTION IN ENTERPRISE NETWORKS May 22, 2023 INADEQUATE TOOLS LEAVE APPSEC FIGHTING AN UPHILL BATTLE FOR CLOUD SECURITY May 19, 2023 CISCO FIXES CRITICAL FLAWS IN SMALL BUSINESS SERIES SWITCHES May 18, 2023 ENHANCING OPEN SOURCE SECURITY: INSIGHTS FROM THE OPENSSF ON ADDRESSING KEY CHALLENGES May 18, 2023 SCAMMERS EXPLOIT AI TREND WITH FAKE CHATGPT APPS ON GOOGLE PLAY, APPLE APP STORE May 17, 2023 Videos Learn more HOW CONTINUOUS SECURITY MONITORING IS CHANGING THE COMPLIANCE GAME May 22, 2023 HOW GENERATIVE AI IS RESHAPING THE IDENTITY VERIFICATION LANDSCAPE May 22, 2023 EXPLORING THE TACTICS OF PHISHING AND SCAM WEBSITES IN 2023 May 19, 2023 INTRODUCING PERMIT.IO: SIMPLIFYING ACCESS CONTROL AND POLICY MANAGEMENT FOR DEVELOPERS May 18, 2023 MALICIOUS OPEN-SOURCE COMPONENTS THREATENING DIGITAL INFRASTRUCTURE May 17, 2023 What's new Get our top stories in your inbox Learn more VULNERABILITY IN ZYXEL FIREWALLS MAY SOON BE WIDELY EXPLOITED (CVE-2023-28771) May 22, 2023 BLACKLIST UNTRUSTWORTHY APPS THAT PEEK BEHIND YOUR FIREWALL May 22, 2023 WIRELESS BROADBAND ALLIANCE CEO ON KEY DRIVERS FOR WI-FI ADOPTION IN ENTERPRISE NETWORKS May 22, 2023 HOW GENERATIVE AI IS RESHAPING THE IDENTITY VERIFICATION LANDSCAPE May 22, 2023 HOW CONTINUOUS SECURITY MONITORING IS CHANGING THE COMPLIANCE GAME May 22, 2023 MALICIOUS LINKS AND MISADDRESSED EMAILS SLIP PAST SECURITY CONTROLS May 22, 2023 WHAT FLYING A PLANE CAN TEACH YOU ABOUT CYBERSECURITY May 22, 2023 WEEK IN REVIEW: KEEPASS VULNERABILITY, APPLE FIXES EXPLOITED WEBKIT 0-DAYS May 21, 2023 APPLE FIXES WEBKIT 0-DAYS UNDER ATTACK (CVE-2023-28204, CVE-2023-32373, CVE-2023-32409) May 19, 2023 DARKBERT COULD HELP AUTOMATE DARK WEB MINING FOR CYBER THREAT INTELLIGENCE May 19, 2023 NEW INFOSEC PRODUCTS OF THE WEEK: MAY 19, 2023 May 19, 2023 EXPLORING THE TACTICS OF PHISHING AND SCAM WEBSITES IN 2023 May 19, 2023 INADEQUATE TOOLS LEAVE APPSEC FIGHTING AN UPHILL BATTLE FOR CLOUD SECURITY May 19, 2023 EUROPE: THE DDOS BATTLEFIELD May 19, 2023 CISCO FIXES CRITICAL FLAWS IN SMALL BUSINESS SERIES SWITCHES May 18, 2023 Expert corner Get our top articles in your inbox Learn more Apu Pavithran CEO, Hexnode BLACKLIST UNTRUSTWORTHY APPS THAT PEEK BEHIND YOUR FIREWALL Szilveszter Szebeni CISO & CDO, Tresorit PREPARING FOR FEDERAL SUPPLY CHAIN SECURITY STANDARDIZATION Ashley Leonard CEO, Syxsense 3 TIPS TO ACCELERATE ZERO TRUST ADOPTION Joe Head CTO, Intrusion IS HUMAN THREAT HUNTING A FOOL’S ERRAND? Aubrey Turner Executive Advisor, Ping Identity TOP 3 TRENDS SHAPING THE FUTURE OF CYBERSECURITY AND IAM Neeraj Singh Senior Security Researcher, WithSecure PREVENT ATTACKERS FROM USING LEGITIMATE TOOLS AGAINST YOU Industry news * Onfido acquires Airside to boost identity verification for individuals and businesses * IBM partners with global universities to develop a quantum-centric supercomputer * Accenture invests in SpiderOak to elevate satellite communications security in space * Zerto 10 for Microsoft Azure delivers disaster recovery (DR) and mobility at scale * NTT and Cisco help customers transition to IoT-as-a-Service model CISO focus * What flying a plane can teach you about cybersecurity * Enhancing open source security: Insights from the OpenSSF on addressing key challenges * Organizations’ cyber resilience efforts fail to keep up with evolving threats * Attack automation becomes a prevalent threat against APIs * 3 tips to accelerate zero trust adoption Latest resources * eBook: Security Compliance for CISOs * The best defense against cyber threats for lean security teams * Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice * Security in the cloud with more automation * Visualize change with an out-of-the-box configuration report Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2023 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×