www.helpnetsecurity.com Open in urlscan Pro
35.81.17.152  Public Scan

Submitted URL: http://www.helpnetsecurity.com/
Effective URL: https://www.helpnetsecurity.com/
Submission: On December 29 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: searchformGET https://www.helpnetsecurity.com/

<form id="searchform" name="searchform" class="searchform" method="get" action="https://www.helpnetsecurity.com/" role="form">
  <div class="input-group">
    <input type="search" name="s" id="headerSearchField" class="form-control" placeholder="What are you looking for?" aria-label="Search" value="" tabindex="1">
    <span class="input-group-append">
      <button class="btn btn-search input-addon-item" type="submit" id="headerSearchSubmit" tabindex="2"><svg class="hic">
          <use xlink:href="#hic-search"></use>
        </svg></button>
    </span>
  </div>
</form>

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1672282918"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle
upmagazine plus
 * News
 * Features
 * Expert analysis
 * Videos
 * Reviews
 * Events
 * Reports
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 





MODERN TECHNOLOGY AND CYBER RECOVERY WILL INTERSECT IN THE NEXT GENERATION OF
ATTACKS

 * CISO roles continue to expand beyond technical expertise
 * Connected homes are expanding, so is attack volume
 * UID smuggling: A new technique for tracking users online
 * 5 cybersecurity trends accelerating in 2023
 * 85% of attacks now use encrypted channels
 * Ensuring trust for high-value digital transactions




3 IMPORTANT CHANGES IN HOW DATA WILL BE USED AND TREATED

December 28, 2022


REPORTED PHISHING ATTACKS HAVE QUINTUPLED

December 28, 2022


LASTPASS SAYS ATTACKERS GOT USERS’ INFO AND PASSWORD VAULT DATA

December 23, 2022


AMPLIFIED SECURITY TRENDS TO WATCH OUT FOR IN 2023

December 22, 2022


APIS ARE PLACING YOUR ENTERPRISE AT RISK

December 21, 2022
Videos
Learn more


SMES: BOOST AWARENESS ON CYBERSECURITY – ENISA TOOLS AND GUIDANCE

December 27, 2022


ADVERSARIAL RISK IN THE AGE OF RANSOMWARE

December 22, 2022


THE BENEFIT OF ADOPTING A HACKER MINDSET FOR BUILDING SECURITY STRATEGIES

December 21, 2022


RANSOMWARE PREDICTIONS FOR 2023

December 20, 2022


WHAT HAPPENS ONCE SCAMMERS RECEIVE FUNDS FROM THEIR VICTIMS

December 19, 2022
What's new
Get our top stories in your inbox
Learn more


REPORTED PHISHING ATTACKS HAVE QUINTUPLED

December 28, 2022


3 IMPORTANT CHANGES IN HOW DATA WILL BE USED AND TREATED

December 28, 2022


SMES: BOOST AWARENESS ON CYBERSECURITY – ENISA TOOLS AND GUIDANCE

December 27, 2022


ENTERPRISES WASTE MONEY ON IDENTITY TOOLS THEY DON’T USE

December 27, 2022


MODERN TECHNOLOGY AND CYBER RECOVERY WILL INTERSECT IN THE NEXT GENERATION OF
ATTACKS

December 27, 2022


LASTPASS SAYS ATTACKERS GOT USERS’ INFO AND PASSWORD VAULT DATA

December 23, 2022


THREAT PREDICTIONS FOR 2023: FROM HACKTIVISM TO CYBERWAR

December 23, 2022


AMPLIFIED SECURITY TRENDS TO WATCH OUT FOR IN 2023

December 22, 2022


ADVERSARIAL RISK IN THE AGE OF RANSOMWARE

December 22, 2022


DEALING WITH CLOUD SECURITY SHORTFALLS

December 22, 2022


APIS ARE PLACING YOUR ENTERPRISE AT RISK

December 21, 2022


THE BENEFIT OF ADOPTING A HACKER MINDSET FOR BUILDING SECURITY STRATEGIES

December 21, 2022


NEW MICROSOFT EXCHANGE EXPLOIT CHAIN LETS RANSOMWARE ATTACKERS IN
(CVE-2022-41080)

December 21, 2022


CISO ROLES CONTINUE TO EXPAND BEYOND TECHNICAL EXPERTISE

December 21, 2022


MAKE SURE YOUR COMPANY IS PREPARED FOR THE HOLIDAY HACKING SEASON

December 20, 2022
Expert corner
Get our top articles in your inbox
Learn more
Manuel Sanchez Information Security & Compliance Specialist, iManage


AMPLIFIED SECURITY TRENDS TO WATCH OUT FOR IN 2023

Jonas Gyllensvaan CEO, SyncDog


APIS ARE PLACING YOUR ENTERPRISE AT RISK

Max Shier CISO, Optiv


MAKE SURE YOUR COMPANY IS PREPARED FOR THE HOLIDAY HACKING SEASON

Will LaSala Field CTO, OneSpan


ENSURING TRUST FOR HIGH-VALUE DIGITAL TRANSACTIONS

Pascal Geenens Director of Threat Intelligence, Radware


WILL 2023 BE ANOTHER YEAR OF CHAOS AND INSTABILITY?

Andrew Hollister CISO, LogRhythm


3 MAJOR THREAT DETECTION METHODS EXPLAINED


Industry news  
 * Supermicro expands its MegaDC product line with ARM-based series of servers
 * Daon offers FIDO-certified biometric authentication on ForgeRock’s cloud
   platform
 * ConcealBrowse protects users against browser-borne attacks
 * NordLayer Device Posture Monitoring checks device compliance
 * PlainID Technology Network optimizes integration with mission-critical
   adjacent technologies

Latest reviews  
 * Review: Enzoic for Active Directory
 * Review: Hornetsecurity 365 Total Protection Enterprise Backup
 * Review: Group-IB Threat Intelligence & Attribution (TI&A)
 * Review: Group-IB Digital Risk Protection
 * Review: The Pentester Blueprint: Starting a Career as an Ethical Hacker
 * Review: Group-IB Threat Hunting Framework

Latest resources  
 * eBook: 4 ways to secure passwords, avoid corporate account takeover
 * Here’s the deal: Uptycs for all of 2023 for $1
 * 2022 Cloud Data Security Report
 * How micro-VMs can protect your most vulnerable endpoints
 * IDC Analyst Brief reveals how passwords aren’t going away
 * Report: Benchmarking security gaps and privileged access



Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×