What happens when a vulnerability in vendor software (not your own) leads to a cyberattack? That’s a watering hole attack, and it’s what we’re exploring here.
With 323,000+ victims worldwide, phishing is the most common cybersecurity threat in the digital sphere. Get the latest trends and stats on avoiding phishing.
Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.
Perhaps unsurprisingly, cybercrime is now available for hire. Harnessing the ‘as a service’ model, find out how cybercrime can be enacted by practically anyone.
Social engineering attacks are everywhere. That’s because they exploit the weakest security link: humans. Read on to know the lifecycle and common techniques.
Cyber threats are not only anonymous. Find out why people you know, and perhaps partner with, are spying on you — and whether it’s corporate espionage.
Is hacking evil? We’ll explain how hacking is a spectrum, with some good, some bad, some ugly. But it has potential to affect 2/3 of the Earth’s population!
Access control: Role based or attribute based? Get the full story on RBAC and ABAC — and yes, even our old friend ACL — in this access control article.
Disaster recovery planning. No one’s favorite activity, but someone’s gotta do it. Plan easily with this step-by-step framework that covers all disaster types.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.
A classic cyberattack, the man in the middle attack is still around. Learn techniques and preventions and see exactly why MITMs are a bit less threatening today.