Network Security

Network Security | News, how-tos, features, reviews, and videos

network security lock padlock breach
Microsoft Windows 7 security patches/updates

vulnerable breach cyberattack hacker

Hackers abuse legitimate remote monitoring and management tools in attacks

Researchers and government agencies warn that threat actors are increasing their use of commercial RMM tools to enable financial scams.

cso security hacker breach ransomeware gettyimages 1081349274 by sestovic 2400x1600px

Recent legal developments bode well for security researchers, but challenges remain

Security researchers gained greater federal legal protections over the past two years, but US state laws and China’s recently adopted vulnerability disclosure law pose threats.

Quantum computing / security

QuSecure launches quantum-computing based security for endpoints

Quantum-based security with what’s advertised as “frictionless” deployment is now available from QuSecure.

Data center / enterprise networking

Remote.it takes steps toward zero trust with 'single line of code' provisioning

New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it’s network management platform.

virtual certificate icon / certification

DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services

Digital security certificate firm says product sets a new standard for managing digital trust and reduces an organization’s attack surface to help prevent data breaches.

security system vulnerabilities - a grid of locks with several unlocked

Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it

Understand why ProxyNotShell is different from Proxyshell and why mitigation advice has changed.

Skull and crossbones emerge from a stream of digital cubes / malicious code / hacking / threat

JSON-based SQL injection attacks trigger need to update web application firewalls

Newly discovered method uses JSON syntax to deliver malicious payloads that bypass SQLi protections in popular WAFs.

Scanning for vulnerabilities.

Microsoft's rough 2022 security year in review

The ubiquity of Microsoft technology in organizations big and small make it a target for attack. These are the most important vulnerabilities and fixes from 2022 that admins need to know.

skull and crossbones in binary code

Flaws in MegaRAC baseband management firmware impact many server brands

The newly discovered vulnerabilities could allow attackers to gain control of servers that use AMI's MegaRAC BMC firmware.

security threat / hacker / attack

Action1 launches threat actor filtering to block remote management platform abuse

Action1 says remote management platform can now identify and terminate any attempt at misuse by attackers.

digital twins woman in profile ai mirror duplicate duo pair

The cybersecurity challenges and opportunities of digital twins

The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.

uk and south korea flags

UK finalizes first independent post-Brexit data transfer deal with South Korea

UK organizations will be able to securely transfer personal data to the Republic of Korea without restrictions by the end of 2022.

secure remote work

How remote working impacts security incident reporting

Security teams must update their security incident reporting policies and processes to account for remote work or risk exposure to increased threats.

analytics mistrust 2

Almost half of customers have left a vendor due to poor digital trust: Report

New research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.

Security system alert, warning of a cyberattack.

Noname Security releases Recon attack simulator

API-focused Noname Security launched an attack simulator designed to feign an external, malicious attack.

protective shield / binary code / COVID-19 coronavirus morphology

Palo Alto releases PAN-OS 11.0 Nova with new evasive malware, injection attack protection

Web proxy support and SaaS security posture management (SSPM) are among new Nova security features designed to help businesses tackle zero-day threats.

Security threat   >   One endpoint on a network has been compromised.

XDR: Still confusing after all these years

It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy.

lock padlock domain name system dns security data center lock icann

Global 2000 companies failing to adopt key domain security measures

Lookalike domains are targeting Forbes Global 2000 brands to launch phishing attacks and other forms of digital brand abuse/IP infringement.

Load More