The Latest in IT Security

Posts Tagged ‘activity’

Despite the multitude of malicious hackers, the truth remains that the root of hacking is not in evil. And the stereotypes that persist are wrong on multiple levels. Not only do they cast a fully negative light on hackers who make their life’s work protecting others, but they also severely underestimate the nefarious capabilities of […]

Read more ...

The Magnitude EK has been on the forefront of most of the malvertising-driven attacks we have seen in the past few weeks. In fact, the intense activity it is generating is overshadowing other exploit kits and distribution methods such as compromised websites. Magnitude EK recently showed some signs of additional refinements, first with the implementation of […]

Read more ...


Categories

TUESDAY, JULY 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments