www.helpnetsecurity.com Open in urlscan Pro
54.244.7.41  Public Scan

Submitted URL: http://www.helpnetsecurity.com/
Effective URL: https://www.helpnetsecurity.com/
Submission: On May 22 via manual from PH — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1684764679"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle
upmagazine plus
 * News
 * Features
 * Expert analysis
 * Videos
 * Reviews
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 




BLACKLIST UNTRUSTWORTHY APPS THAT PEEK BEHIND YOUR FIREWALL

 * TP-Link routers implanted with malicious firmware in state-sponsored attacks
 * Google Cloud CISO on why the Google Cybersecurity Certificate matters
 * Preparing for federal supply chain security standardization
 * KeePass flaw allows retrieval of master password, PoC is public
   (CVE-2023-32784)
 * 3 tips to accelerate zero trust adoption
 * Attack automation becomes a prevalent threat against APIs
 * Is human threat hunting a fool’s errand?

DOWNLOADS
 * CIS Benchmarks
 * eBook: Security Compliance for CISOs


WIRELESS BROADBAND ALLIANCE CEO ON KEY DRIVERS FOR WI-FI ADOPTION IN ENTERPRISE
NETWORKS

May 22, 2023


INADEQUATE TOOLS LEAVE APPSEC FIGHTING AN UPHILL BATTLE FOR CLOUD SECURITY

May 19, 2023


CISCO FIXES CRITICAL FLAWS IN SMALL BUSINESS SERIES SWITCHES

May 18, 2023


ENHANCING OPEN SOURCE SECURITY: INSIGHTS FROM THE OPENSSF ON ADDRESSING KEY
CHALLENGES

May 18, 2023


SCAMMERS EXPLOIT AI TREND WITH FAKE CHATGPT APPS ON GOOGLE PLAY, APPLE APP STORE

May 17, 2023
Videos
Learn more


HOW CONTINUOUS SECURITY MONITORING IS CHANGING THE COMPLIANCE GAME

May 22, 2023


HOW GENERATIVE AI IS RESHAPING THE IDENTITY VERIFICATION LANDSCAPE

May 22, 2023


EXPLORING THE TACTICS OF PHISHING AND SCAM WEBSITES IN 2023

May 19, 2023


INTRODUCING PERMIT.IO: SIMPLIFYING ACCESS CONTROL AND POLICY MANAGEMENT FOR
DEVELOPERS

May 18, 2023


MALICIOUS OPEN-SOURCE COMPONENTS THREATENING DIGITAL INFRASTRUCTURE

May 17, 2023
What's new
Get our top stories in your inbox
Learn more


VULNERABILITY IN ZYXEL FIREWALLS MAY SOON BE WIDELY EXPLOITED (CVE-2023-28771)

May 22, 2023


BLACKLIST UNTRUSTWORTHY APPS THAT PEEK BEHIND YOUR FIREWALL

May 22, 2023


WIRELESS BROADBAND ALLIANCE CEO ON KEY DRIVERS FOR WI-FI ADOPTION IN ENTERPRISE
NETWORKS

May 22, 2023


HOW GENERATIVE AI IS RESHAPING THE IDENTITY VERIFICATION LANDSCAPE

May 22, 2023


HOW CONTINUOUS SECURITY MONITORING IS CHANGING THE COMPLIANCE GAME

May 22, 2023


MALICIOUS LINKS AND MISADDRESSED EMAILS SLIP PAST SECURITY CONTROLS

May 22, 2023


WHAT FLYING A PLANE CAN TEACH YOU ABOUT CYBERSECURITY

May 22, 2023


WEEK IN REVIEW: KEEPASS VULNERABILITY, APPLE FIXES EXPLOITED WEBKIT 0-DAYS

May 21, 2023


APPLE FIXES WEBKIT 0-DAYS UNDER ATTACK (CVE-2023-28204, CVE-2023-32373,
CVE-2023-32409)

May 19, 2023


DARKBERT COULD HELP AUTOMATE DARK WEB MINING FOR CYBER THREAT INTELLIGENCE

May 19, 2023


NEW INFOSEC PRODUCTS OF THE WEEK: MAY 19, 2023

May 19, 2023


EXPLORING THE TACTICS OF PHISHING AND SCAM WEBSITES IN 2023

May 19, 2023


INADEQUATE TOOLS LEAVE APPSEC FIGHTING AN UPHILL BATTLE FOR CLOUD SECURITY

May 19, 2023


EUROPE: THE DDOS BATTLEFIELD

May 19, 2023


CISCO FIXES CRITICAL FLAWS IN SMALL BUSINESS SERIES SWITCHES

May 18, 2023
Expert corner
Get our top articles in your inbox
Learn more
Apu Pavithran CEO, Hexnode


BLACKLIST UNTRUSTWORTHY APPS THAT PEEK BEHIND YOUR FIREWALL

Szilveszter Szebeni CISO & CDO, Tresorit


PREPARING FOR FEDERAL SUPPLY CHAIN SECURITY STANDARDIZATION

Ashley Leonard CEO, Syxsense


3 TIPS TO ACCELERATE ZERO TRUST ADOPTION

Joe Head CTO, Intrusion


IS HUMAN THREAT HUNTING A FOOL’S ERRAND?

Aubrey Turner Executive Advisor, Ping Identity


TOP 3 TRENDS SHAPING THE FUTURE OF CYBERSECURITY AND IAM

Neeraj Singh Senior Security Researcher, WithSecure


PREVENT ATTACKERS FROM USING LEGITIMATE TOOLS AGAINST YOU


Industry news  
 * Onfido acquires Airside to boost identity verification for individuals and
   businesses
 * IBM partners with global universities to develop a quantum-centric
   supercomputer
 * Accenture invests in SpiderOak to elevate satellite communications security
   in space
 * Zerto 10 for Microsoft Azure delivers disaster recovery (DR) and mobility at
   scale
 * NTT and Cisco help customers transition to IoT-as-a-Service model

CISO focus  
 * What flying a plane can teach you about cybersecurity
 * Enhancing open source security: Insights from the OpenSSF on addressing key
   challenges
 * Organizations’ cyber resilience efforts fail to keep up with evolving threats
 * Attack automation becomes a prevalent threat against APIs
 * 3 tips to accelerate zero trust adoption

Latest resources  
 * eBook: Security Compliance for CISOs
 * The best defense against cyber threats for lean security teams
 * Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice
 * Security in the cloud with more automation
 * Visualize change with an out-of-the-box configuration report



Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×