Emerging Information Security Threats News
January 11, 2017
Poor authentication in MongoDB configurations has led to a sharp increase in ransom attacks, and experts say tens of thousands of databases could be at risk.
December 09, 2016
News roundup: Internet-connected devices, including 3.2 million routers; 80-plus models of CCTV cameras have backdoors; Dirty Cow gets patched; NSA suffers 'brain drain' and more.
December 02, 2016
Authorities from 30 countries have dismantled Avalanche, the crimeware-as-a-service network used to steal hundreds of millions from victims around the globe.
November 18, 2016
Just two weeks before the deadline, U.S. lawmakers seek to postpone until next summer the acceptance of controversial updates to Rule 41, allowing legal access to unspecified systems.
Emerging Information Security Threats Get Started
Bring yourself up to speed with our introductory content
An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers. There are both legitimate and unscrupulous uses for acoustical mesh networks. Continue Reading
An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware. Continue Reading
A memory dump is the process of taking all information content in RAM and writing it to a storage drive. Developers commonly use memory dumps to gather diagnostic information at the time of a crash to help them troubleshoot issues and learn more ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Emerging Information Security Threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
DDoS amplification attacks that use the CLDAP protocol are a new threat to enterprises. Expert Matthew Pascucci explains how they work and how enterprises can protect themselves. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the recent cyberattacks on state voter databases and what they could mean for this election season. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the mystery behind the recent Equation Group hack and the motives and identity of the Shadow Brokers. Continue Reading
Manage Emerging Information Security Threats
Learn to apply best practices and optimize your operations.
Ever since the internet of things became a "thing," the potential for abuse has been well documented; how best to achieve security for IoT is not yet clear. This Insider Edition of Information Security magazine tackles that second ... Continue Reading
In part two of Risk & Repeat's podcast on the Equation Group, SearchSecurity editors discuss the zero-day vulnerabilities discovered in the Shadow Brokers' data dump. Continue Reading
Organizations need to be aware of the threat of cyberextortion attacks and defend against them. Mike O. Villegas discusses the CISO's role in setting up the defense. Continue Reading
Problem Solve Emerging Information Security Threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Visibility is crucial for countering internet of things dangers. Learn how to discover what IoT devices are touching your network and what threats they may pose. Continue Reading
Zero-day exploits for network routers and firewalls were released by the Shadow Brokers. Expert Kevin Beaver offers steps for enterprises to address zero-day attacks. Continue Reading
Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response. Continue Reading