Information Security News, Guides & Expert Analysis
Masquerade attacks can be difficult to detect because the attackers use valid credentials. This post takes looks at how masquerade attacks work and provides tips on how to defend against them.
Software vulnerabilities are quite common but if even one of them turns out to be a zero-day, the damage could be massive. We look at what zero-day exploits are and what you can do about them.
Integer overflow attacks exploit coding flaws and can have serious consequences. Learn about integer overflow attack examples in our guide.
In this post we take a deep dive into Apple's proposed client-side CSAM scanning to find out what all the fuss is about.
Millions of anonymous messages and user records apparently from the secret sharing app Whisper were exposed online without a password. Again.
Watering hole attacks can be devastating to organizations - and they're quite common. In this post we explain what watering hole attacks are and how you can avoid them.
Cybersecurity risk management is the continuous process of identifying, analyzing, evaluating, and addressing an organization’s cyber security threats. Learn how to design and implement your security processes.
Exposed names, email addresses, and IP addresses could put millions of Stripchat users at risk.
Web cache poisoning attacks can put your web site/application at risk, as well as your users. In this post, we look at how web cache poisoning attacks work and what you can do to prevent them.