The Latest in IT Security

Posts Tagged ‘security team’

Unless your current threat management program is fully capable of securing internet of things (IoT) devices, you could likely benefit from attending an IoT security summit to learn what other industry leaders are doing to discover, analyze and protect unmanaged devices. As a chief information security officer (CISO) or other security leader, you may be […]

Read more ...

Spam campaigns based on the Blackhole Exploit Kit send messages that contain links to compromised legitimate websites, which serve hidden iframes and redirections that exploit vulnerabilities across operating systems-from Android to Windows. Spam themes we have seen vary rapidly and are disguised to appear as legitimate messages from familiar services. Campaigns spoofing Facebook, LinkedIn, American […]

Read more ...

We recently published an article about an interesting case where a very popular WordPress Plugin (Social Media Widget), with more than 900,000 downloads, got sold and the new owners decided to use their big audience and inject spam on all the sites using the plugin. If you read the post, you will see how they […]

Read more ...


Categories

MONDAY, NOVEMBER 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments