dcsimg

Threats - Article Archives - Page 2

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

June 06, 2018 |

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding – and the sales numbers prove it.

READ MORE

How to Stop Advanced Persistent Threats

May 22, 2018 |

A security professional's guide to advanced persistent threats and how to stop and prevent them.

READ MORE

What Is SQL Injection and How Can It Hurt You?

May 07, 2018 |

Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.

READ MORE

How to Prevent SQL Injection Attacks

May 02, 2018 |

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

READ MORE

The Shifting Threat Landscape: From Adobe to Microsoft

March 30, 2018 |

Several recent studies demonstrate significant changes in the types of threats facing companies worldwide.

READ MORE

Does Your Browser Block Cryptojacking Attacks?

March 29, 2018 |

Learn what you can do to limit the risk of in-browser cryptojacking attacks.

READ MORE

Microsoft Patches Massive Remote Access Vulnerability

March 13, 2018 |

The flaw affects all versions of Windows.

READ MORE

Mitigating the Memcached DDoS Threat

March 03, 2018 |

The new attack vector was recently used to launch a record-breaking 1.35 Tbps attack on GitHub.

READ MORE

How to Defend Servers Against Cryptojacking

February 28, 2018 |

Learn how to take proactive steps to help mitigate the risk of becoming an unwitting accomplice to cryptojacking attack.

READ MORE

Why Bug Bounties Matter

February 12, 2018 |

Paying security researchers to help discover vulnerabilities is a winning formula. Find out more in this first part of a new eSecurityPlanet series on the bug bounty industry

READ MORE

AutoSploit: Making Massive Cyber Attacks Too Easy?

February 08, 2018 |

The tool automates the process of launching attacks on remote targets.

READ MORE

What is Cryptojacking and Why Is It a Cybersecurity Risk?

February 06, 2018 |

Learn about this emerging attack method and how it's impacting organizations around the world in this eSecurityPlanet series.

READ MORE

10 Top Patch Management Solutions

January 19, 2018 |

Patch management might be the single most important security tool. We review 10 of the top patch management solutions.

READ MORE

Assessing the Impact of Meltdown and Spectre: Companies Rush to Mitigate the Threat

January 05, 2018 |

As Intel is hit with class action lawsuits, enterprises are working quickly to assess the potential impact of the flaws.

READ MORE

DDoS Attacks Increasingly Blended Multiple Attack Vectors in Q3 2017

December 29, 2017 |

The overall number of attacks rose by 15.6 percent over the previous quarter.

READ MORE

While Blaming Companies for Breaches, Consumers Aren't Prioritizing Their Own Security

December 22, 2017 |

Just 25 percent of U.S. consumers use two-factor authentication, and just 45 percent use a PIN to protect their mobile device.

READ MORE

Lessons Learned from the OPM Breach

December 21, 2017 |

VIDEO: Michael Daniel, President of the CTA and former official in the Obama Administration, provides some insight into what went wrong at OPM and why encryption isn't enough.

READ MORE

Cloud Leaks Continue: 123 Million U.S. Households' Personal Information Exposed Online

December 20, 2017 |

The information, from data analytics firm Alteryx, was in an Amazon S3 bucket configured to provide any AWS user with access.

READ MORE

78 Percent of U.S. Healthcare Providers Were Hit by Email Cyber Attacks in 2017

December 19, 2017 |

And 87 percent expect the volume of email threats to increase.

READ MORE

Nation State Attackers Shut Down Industrial Plant with New ICS Malware

December 15, 2017 |

The malware was designed specifically to target Triconex SIS controllers.

READ MORE