Threats

How Hackers Use Reconnaissance – and How to Protect Against It

Information gathering is often the starting point of a cyberattack. For many hackers, before attempting anything they want to know who they’re dealing with, what vulnerabilities they might exploit, an...

WatchGuard, Windows Vulnerabilities Require Urgent Fixes

Vulnerabilities in WatchGuard firewalls and Microsoft Windows and Windows Server need to be patched and fixed immediately, security organizations said in alerts this week. The U.S. Cybersecurity an...

Critical Infrastructure, ICS/SCADA Systems Under Attack by Advanced Threat Groups

Critical infrastructure, industrial control (ICS) and supervisory control and data acquisition (SCADA) systems are under increasing threat of cyber attacks, according to a number of recent warnings fr...

How Hackers Evade Detection

Bypassing detection tools is part of a hacker's routine these days. Despite the incredible evolution of defensive technologies, attackers often remain undetected for weeks or months, earning the label...

Protecting Against the Spring4Shell Vulnerability

Spring4Shell (CVE-2022-22965) is a remote code execution (RCE) vulnerability that affects Spring Core, a comprehensive framework for Java-based enterprise applications. Spring4Shell gets its name f...

Complete Guide to Phishing Attacks: What Are the Different Types and Defenses?

As web security improves, email security has become a bigger problem than ever. The overwhelming majority of malware attacks now come from email — as high as 89 percent, according to HP Wolf Security...

A Few Clicks from Data Disaster: The State of Enterprise Security

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to a new study. The report by breach and...

Addressing Remote Desktop Attacks and Security

The Remote Desktop Protocol (RDP) has long been essential for IT service management and remote access. Still, in the wrong hands, RDP attacks and vulnerabilities related to remote desktop software ar...

LAPSUS$ Cyber Crime Spree Nabs Microsoft, Okta, NVIDIA, Samsung

The LAPSUS$ threat group has had an attention-grabbing month, snaring high-profile victims like Microsoft, Okta, NVIDIA, Samsung and others. On March 22, Microsoft confirmed a substantial breach by...

APT Attacks & Prevention

A company that discovers that an advanced persistent threat (APT) attack is underway tends to be the exception. Attackers design APTs to be subtle, persistent, and to remain undetected for as long as ...

Latest articles