Network Security | News, how-tos, features, reviews, and videos
The unusual and persistent probing activity over the span of multiple years should be a reminder to organizations to identify and remove all open DNS resolvers from their networks.
The Chinese APT group is using a variety of tools to infiltrate networks and steal large amounts of data.
Two methods discovered by Varonis Threat Labs can allow attackers to get around audit logs and steal files without setting off alarms.
New feature is designed to stop bad actors from intrusions that rely on stealing session cookies by using TPM crypto processors to securely store keys locally.
The proof-of-concept exploit is easy to execute, and could foretell wider targeting of the Fortinet vulnerability by attackers.
The Russia-sponsored APT group appears to have increased its activity in an attempt to leverage secrets gained from the Microsoft email breach discovered in January.
Not yet exploited, these flaws could allow malicious code to be placed on host systems from inside a virtual machine.
An initial access broker is able to grab authentication information when a victim opens the email attachments for access to Windows networks.
The vulnerability allows attackers to bypass Microsoft's Office Protected View mode.
The phishing campaign bypasses anti-spoofing protections and is otherwise difficult to identify as malicious.