Threat Groups Distributing Malware via Google Ads

Security researchers are warning that Google Ads are being actively leveraged to distribute malware to unsuspecting victims searching for software downloads. On January 20, CronUp researcher Germán Fernández warned that the DEV-0569 ransomware gro...

10 Best Identity and Access Management (IAM) Solutions

Identity and Access Management (IAM) once helped IT departments in large enterprises to manage employees in Active Directory. In a modern IT environment IAM plays a far more critical role in authorizing geographically dispersed workforces as they con...

How to Prevent Cross-Site Scripting (XSS) Attacks

Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim's behalf. Attackers may use this opportunity to alter web pages, post on social accounts, initiate bank transfers or make ...

Cybercriminals Use VSCode Extensions as New Attack Vector

Microsoft's Visual Studio Code integrated development environment (IDE) is used by as much as 75% of developers, so any security issue has widespread implications. And Aqua Nautilus researchers have discovered a big one. The researchers reported e...

IT Security Resources

Latest Security News and Analysis

Endpoint Articles

How to Prevent Cross-Site Scripting (XSS) Attacks

Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim's behalf. Attackers may use this opportunity to alter web pages, post on social accounts, initiate bank transfers or make ...

REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis

REMnux is a free community distribution that ethical hackers, security researchers, and many other security pros can leverage to build their own labs and speed up malware analysis. Whether you’re new to these specialties or an experienced investi...

Top Network Detection & Response (NDR) Solutions

In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas older solutions like antivirus, firewalls, and endpo...

Highly Sophisticated Malware Attacks Home and Small Office Routers

Security researchers have uncovered an unusually sophisticated malware that has been targeting small office/home office (SOHO) routers for nearly two years, taking advantage of the pandemic and rapid shift to remote work. Such routers are ra...

Top Products

Popular categories