Search results for: “threat intelligence”
-
Thousands of Data Center Management Apps Exposed to Internet
Tens of thousands of applications that are critical to the operations of data centers around the globe are exposed to the internet, with many secured…
-
Microsoft Fights Off Another Record DDoS Attack as Incidents Soar
Microsoft in November fended off a massive distributed denial-of-service (DDoS) attack in its Azure cloud that officials said was the largest ever recorded, the latest…
-
White House Boosts Zero Trust with New Cybersecurity Strategy
The Biden Administration is pushing federal agencies to adopt a zero-trust security architecture to protect themselves and their data from “increasingly sophisticated and persistent threat…
-
Best Managed Security Service Providers (MSSPs)
As threats mount from ransomware gangs, Russian-backed hacker groups, and other nation-sponsored attackers and as the growth in remote work makes security management increasingly complicated,…
-
CISA, Microsoft Warn of Wiper Malware Amid Russia-Ukraine Tensions
The U.S. government agency overseeing cybersecurity is urging the country’s businesses and other organizations to take the necessary steps to protect their networks from any…
-
Iran-Based APT35 Group Exploits Log4J Flaw
Security researchers are continuing to see state-supported hacking groups developing tools to leverage the high-profile Log4j vulnerability that exploded onto the scene last month even…
-
NY AG Investigation Highlights Dangers of Credential Stuffing
A report last week by the New York Attorney General’s Office put a spotlight on the ongoing threat of credential stuffing, a common technique used…
-
How to Use MITRE ATT&CK to Understand Attacker Behavior
MITRE ATT&CK (“miter attack”) is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases,…
-
The Link Between Ransomware and Cryptocurrency
There are few guarantees in the IT industry, but one certainty is that as the world steps into 2022, ransomware will continue to be a…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (78)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (340)
- News (10)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (352)
- Trends (201)
- Video (17)