Hackers Use RMM Software to Breach Federal Agencies

Cybercriminals recently breached U.S. federal agencies using remote monitoring and management (RMM) software as part of a widespread campaign. The malicious campaign began in June 2022 or earlier and was detected a few months later, according to a...

Threat Groups Distributing Malware via Google Ads

Security researchers are warning that Google Ads are being actively leveraged to distribute malware to unsuspecting victims searching for software downloads. On January 20, CronUp researcher Germán Fernández warned that the DEV-0569 ransomware gro...

10 Best Identity and Access Management (IAM) Solutions

Identity and Access Management (IAM) once helped IT departments in large enterprises to manage employees in Active Directory. In a modern IT environment IAM plays a far more critical role in authorizing geographically dispersed workforces as they con...

How to Prevent Cross-Site Scripting (XSS) Attacks

Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim's behalf. Attackers may use this opportunity to alter web pages, post on social accounts, initiate bank transfers or make ...

IT Security Resources

Latest Security News and Analysis

Endpoint Articles

How to Prevent Cross-Site Scripting (XSS) Attacks

Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim's behalf. Attackers may use this opportunity to alter web pages, post on social accounts, initiate bank transfers or make ...

REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis

REMnux is a free community distribution that ethical hackers, security researchers, and many other security pros can leverage to build their own labs and speed up malware analysis. Whether you’re new to these specialties or an experienced investi...

Top Network Detection & Response (NDR) Solutions

In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas older solutions like antivirus, firewalls, and endpo...

Highly Sophisticated Malware Attacks Home and Small Office Routers

Security researchers have uncovered an unusually sophisticated malware that has been targeting small office/home office (SOHO) routers for nearly two years, taking advantage of the pandemic and rapid shift to remote work. Such routers are ra...

Top Products

Popular categories