Threats

The Microsoft Exchange Attack Saga Continues

With companies and organizations under siege on so many fronts over the past year, the last thing internal IT departments needed was another daunting...

Google Chrome’s Latest Zero-Day Bug: What You Need to Know

Google Chrome is the most widely used web browser on the market by a landslide, so bugs and other vulnerabilities can spell disaster if...

How to Prevent SQL Injection Attacks

First discovered in 1998, SQL injections (SQLi) are still a devastatingly effective attack technique and remain a top database security priority. SQL, or Structured Query...

Ransomware Protection in 2021

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. A...

Types of Malware & Best Malware Protection Practices

Malware, short for "malicious software," is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the...

Protecting Against Solorigate TTPs: SolarWinds Hack Defenses

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...

Cybersecurity Outlook 2021: Trends and Predictions

Just when it seemed that 2020 couldn't get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities...

Latest articles