Hacking

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

ESDS launches MTvScan 2.0 with HSMC as India’s exclusive partner

The new version is equipped with deep-scanning technology that is designed to prevent smartphone-based phishing scams.

‘EternalBlue’ continues to be a popular threat actor among cybercriminals: Seqrite

Over 18 Million hits of Ransomware and Cryptomining campaigns in 2017-2018. ‘EternalBlue’ is the deadliest exploit leaked by hacking group known as Shadow Brokers in April last year.

Aditya Birla Group suffers cryptojack attack; 2000 computers used for mining Monero

First detected at an overseas subsidiary of the group a month ago, the malware spread to manufacturing and other services companies of Aditya Birla group. Monero was the currency mined.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises.