Category: Help Net Security

Parrot OS shares its 2026 plans for security tools and platform support

Parrot OS is a Debian-based Linux distribution built for cybersecurity work. Security practitioners use it for penetration testing, digital forensics, malware analysis, and privacy-focused research. The operating system bundles security tools, development utilities, and privacy features into a maintained platform…

Teaching cybersecurity by letting students break things

Cybersecurity students show higher engagement when the work feels tangible. A new study from Airbus Cybersecurity and Dauphine University describes what happens when courses move beyond lectures and place students inside structured hacking scenarios, social engineering exercises, and competitive games.…

Turning cyber metrics into decisions leaders can act on

In this Help Net Security video, Bryan Sacks, Field CISO at Myriad360, explains how security leaders can measure cybersecurity in ways that matter to executives and boards. He argues that metrics should support decisions, not exist for reporting alone. The…

What insurers expect from cyber risk in 2026

Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers, and security teams are feeling that pressure across underwriting, claims, and risk management. A new global study by CyberCube examines…

Cybersecurity jobs available right now: January 13, 2026

CISO CSIRO | Australia | Remote – View job details As a CISO, you will lead and manage CSIRO’s cyber security strategy and program in alignment with the broader protective security framework. You will establish, maintain, and mature the information…

There was no data breach, Instagram says

News of a possible Instagram data breach spread over the weekend after Malwarebytes reported that cybercriminals had stolen sensitive information from 17.5 million Instagram accounts, potentially leading to a surge in password reset requests. Users have been complaining last week…

Crypto crime hits record levels as state actors move billions

Nation-state involvement in crypto increased in 2025, signaling a shift in how on-chain crime operates. Three waves of crypto crime (Source: Chainalysis) Research from Chainalysis shows that crypto-related crime has grown more organized over recent years, with illicit groups running…

Rethinking OT security for project heavy shipyards

In this Help Net Security interview, Hans Quivooij, CISO at Damen Shipyards Group, discusses securing OT and ICS in the shipyard. He outlines how project-based operations, rotating contractors, and temporary systems expand the threat surface and complicate access control. Quivooij…

pfSense: Open-source firewall and routing platform

Firewalls, VPN access, and traffic rules need steady attention, often with limited budgets and staff. In that context, the open source pfSense Community Edition (CE) continues to show up in production environments, supported by a long-standing user community. pfSense CE…

What security teams can learn from torrent metadata

Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate networks. Torrent traffic shows up in investigations tied to policy violations, insider risk, and criminal activity. A new research paper looks at that…