Network Security | News, how-tos, features, reviews, and videos
In a report identifying the most effective and popular subject lines used by phishing attackers, HR was tops, along with “IT: Backup has failed” and “Action Required: Rejected Deposit.” Maybe subject line colons should be bann
The Black Hat series of international cybersecurity conferences brings together top IT security pros, researchers, and thought leaders to discuss the latest cyber techniques, vulnerabilities, threats, and more. Here’s the latest to know.
Attack discovered by Guardio researchers shows how criminals can bypass email protections such as DKIM and SPF.
Sharing connection information could be a problem among users of the same VPN server without proper protection, researchers have found. Corporate VPN servers in particular are vulnerable to the flaw.
Reputation filters used to prevent access to phishing sites were misused to allow access to the very sites they are meant to prevent access to.
Ransomware actors often prioritize gaining initial access to targeted networks, says Cisco’s Talos security intelligence group.
The coordinated operation took down 593 IP addresses, which were flagged for abuse of the legitimate pen-testing software.
The moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant.
Researchers from Qualys say regreSSHion allows attackers to take over servers with 14 million potentially vulnerable OpenSSH instances identified.
TeamViewer says the attack targeted its corporate network, not customer data or product functionality.