The Latest in IT Security

Posts Tagged ‘Attackers’

Attackers often use tasks as a means to hide their tracks. They might also use the ability to run tasks with different user rights to gain more access. Earlier, I recommended that you set up auditing to track tasks being set. Now I recommend you harden a setting on your workstations to prevent task scheduling […]

Read more ...

Hardly a day that goes by before some website reports a credential-stuffing attack where harvested usernames and passwords are used to gain access to sensitive information. Lately it was tax software site TurboTax where attackers accessed users’ tax information. This underscores the risk of password reuse. Organizations need a strong password policy to encourage good […]

Read more ...

Distributed denial-of-service attacks targeting large Internet service providers surged in the third quarter of last year as attackers began using a stealthy new tactic to sneak DDoS traffic past detection mechanisms. An analysis of DDoS data during Q3 2018 by Nexusguard showed attackers trying to overwhelm targeted sites, and even entire ISP — aka communications […]

Read more ...

Categories

TUESDAY, JUNE 25, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks