Security News
Devs strip code from toolkit amid blogger dramarama A British web-dev outfit has denied allegations it deliberately hid code inside its WordPress plugins that, among other things, spammed a...
In this Help Net Security podcast recorded at RSA Conference 2019, Nicholas Hayden, Senior Director of Threat Intelligence at Anomali, talks about how Anomali arms security teams with highly...
Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and production downtime in the...
Multi-stage attacks use diverse and distributed methods to circumvent existing defenses and evade detection - spanning endpoints, networks, email and other vectors in an attempt to land and...
Vishak Raman of Cisco on Coping With the Expanding Attack SurfaceThe advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result,...
Employee mistakes were ranked as the highest risk in the 2019 Global Encryption Trends Study, though employee-owned devices on company networks deserve more security scrutiny.
Verizon's Ashish Thapar Discusses the Evolving Threat LandscapeInsider threats continue to be difficult to detect, says Ashish Thapar of Verizon, who offers a summary of a new report on these threats.
Stuart Reed of Nominet on Using DNS to Get Visibility on Security RisksThe information provided in a domain name system is far deeper than just those transactions that take place. A DNS provides...
IoT and digital transformation efforts will leave more businesses vulnerable to cyberattack, according to Information Security Forum.
Hardik Modi of Netscout Analyzes the Latest Cybercrime TrendsNetscout is out with its latest threat report, and the research offers some startling new insights into DDoS, advanced threats and the...