The Latest in IT Security

Posts Tagged ‘Tech’

The Kelihos botnet has kept a low profile following takedown attempts a few years ago when it was highly active, but has shown significant spikes in activity recently, MalwareTech warns. The botnet’s infections remained very low over the past years, while the activity it focused on was spamming stock pump and dump schemes or pharmaceutical scams…

Read more ...

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with incident reports to zero in on cases of actual ongoing infiltration. According to a report released in August by research firm Technavio, the deception technology market is growing at a […]

Read more ...

Security researchers discovered a series of implementations of an old type of exploit known as code hooking. These implementations are increasing and becoming more dangerous. Operating under the name of Captain Hook, these exploits make use of code injection techniques that could cause numerous vulnerabilities and potentially affect thousands of products. Let’s take a closer […]

Read more ...


Categories

WEDNESDAY, JUNE 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments