Part one of this two-part article series examines password spray, credential stuffing, and man-in-the-middle attacks and techniques and tools for mitigation
What are the most prominent identity-based attacks and how are they carried out? And how can security teams leverage identity technologies to mitigate those attacks and reduce their organizational risk?
The Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) have released an advisory on top malware strains in 2021.
The “phygital” attack, which bridges “physical” and “digital,” is a serious threat to critical infrastructure. What can chief security officers (CSOs), chief information security officers (CISOs), and other security leaders do to protect companies against them?
A new Akamai report reveals that cyberattacks on player accounts and gaming companies increased dramatically in the past year, with web application attacks doubling.
The Synopsys Cybersecurity Research Center (CyRC) team has identified a local privilege escalation vulnerability in Kaspersky VPN Secure Connection for Microsoft Windows.
One-third of organizations experience at least one ransomware attack per week, with 9% of enterprises experiencing one daily, according to a report from Menlo Security.
What are some cybersecurity threat trends that will likely dominate the landscape in 2023 and beyond? A new Intel 471 report reveals threats organizations need to prepare for.