Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Millions of devices, from consumer products like printers and IP cameras to specialized devices used across organizations such as video conferencing systems and industrial control…

View More Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries
Attack Surface Area Larger Than Most Businesses Believe

Attack Surface Area Larger Than Most Businesses Believe

Workers are not the only outside-the-perimeter security risk. Companies have a variety of vulnerable Internet-facing resources exposing their business to risk, study finds. Companies focused…

View More Attack Surface Area Larger Than Most Businesses Believe
Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall

Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall

Users of a widely used firewall from Sophos have been under a zero-day attack that was designed to steal usernames, cryptographically protected passwords, and other…

View More Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall
Single Malicious GIF Opened Microsoft Teams to Nasty Attack

Single Malicious GIF Opened Microsoft Teams to Nasty Attack

Microsoft has fixed a subdomain takeover vulnerability in its collaboration platform Microsoft Teams that could have allowed an inside attacker to weaponize a single GIF…

View More Single Malicious GIF Opened Microsoft Teams to Nasty Attack
Dutch police take down 15 DDoS services in a week

Dutch police take down 15 DDoS services in a week

In a press release published today, Dutch police said they have successfully taken down 15 DDoS-for-hire services in the span of a week, as part…

View More Dutch police take down 15 DDoS services in a week
Vietnam Rises as Cyberthreat

Vietnam Rises as Cyberthreat

The country’s rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity. Vietnam has rarely been associated with cybercrime…

View More Vietnam Rises as Cyberthreat
What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly…

View More What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams
'Malware-free' attacks now most popular tactic amongst cybercriminals

‘Malware-free’ attacks now most popular tactic amongst cybercriminals

More than half of attacks last year leveraged fileless or “malware-free” techniques, as hackers increasingly turn to stolen credentials in their efforts to breach corporate…

View More ‘Malware-free’ attacks now most popular tactic amongst cybercriminals
Cyber Kill Chain - Lockheed Martin

Cyber Kill Chain – Lockheed Martin

Security incidents are events that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them…

View More Cyber Kill Chain – Lockheed Martin
The Risk of “Credential Stuffing” to the Smart Home

The Risk of “Credential Stuffing” to the Smart Home

As technology advances and the costs of connecting electronic components to the internet decreases, the cost of having a connected “smart home” also decreases. Sensors…

View More The Risk of “Credential Stuffing” to the Smart Home