The Latest in IT Security

Posts Tagged ‘vulnerabilities’

The Log4Shell critical vulnerability that impacted millions of enterprise applications remains a common cause for security breaches a year after it received patches and widespread attention and is expected to remain a popular target for some time to come. Its long-lasting impact highlights the major risks posed by flaws in transitive software dependencies and the […]

Read more ...

As every infosec expert knows, cybercriminals just love holidays. Trusting users can expect sales scams and phishing under the guise of gifts and congratulations, while organizations can look forward to DDoS attacks on their servers (like the ones Xbox and PlayStation services experienced) or, worse, network intrusions (talking about you, BBC). For network attackers, Christmas […]

Read more ...

Many an article chronicles hacked passwords available in bulk on the evil “Dark Web.” It’s presented as evidence that the bad behavior of users is the root of all hacking. But as a former red teamer, the end user isn’t the only one who is a prisoner to discernable behavioral patterns. There is a “pattern […]

Read more ...


Categories

TUESDAY, APRIL 01, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments