Network Security | News, how-tos, features, reviews, and videos
Sophisticated attack employs stealthy and evasive techniques and tools to make defense and detection more challenging.
At the Black Hat and DEF CON conferences, Viasat and the NSA offered detailed accounts about what went down when Russian hackers shut off tens of thousands of satellite broadband modems in the Ukraine war’s first significant cyberattack.
Phishing emails are still the primary initial attack vector for cybersecurity incidents, according to a report from Cloudflare.
Check Point Software will integrate Perimater 81's zero trust network access and rapid deployment technology into its existing Infinity product architecture.
Here are the top cybersecurity tools, platforms, capabilities, services, and technologies launched at Black Hat USA 2023 that you need to know about.
The goal is to help defenders more quickly detect attacks enabled by managed file transfer application vulnerabilities and provide an incident response playbook.
Exploiting Cloudflare Tunnel requires little skill and potentially could compromise and entire network.
Malware and backdoors used in attacks affecting some Fortune 500 companies.
As this year's Hacker Summer Camp gets underway with dozens of CTF events, the obligations for players to report zero-day bugs they discover are murky.
XDR platform uses native and third-party attack signals across hybrid cloud domains including AWS, Microsoft Azure, and Google Cloud as well as networks and endpoints.
Sponsored Links