By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Emerging cyberattacks and threats News
April 21, 2017
News roundup: The Hajime worm is the nicer, sneakier brother of Mirai malware. Plus, the FBI and CIA hunt for the Vault 7 whistleblower, Symantec adds to Zscaler lawsuit, and more.
March 24, 2017
News roundup: Cisco fixes a Vault 7 flaw unaided, despite WikiLeaks' pledge to work with vendors. Plus, LastPass flaws leak user data; Apple held hostage by hackers; and more.
March 17, 2017
News roundup: An Apache Struts vulnerability is still being exploited, despite being patched. Plus, WhatsApp and Telegram release patches; Assange contacts Microsoft; and more.
February 16, 2017
An RSA Conference session on a new attack on connected medical devices led to a spirited debate on vulnerability disclosure and manufacturer responsibility.
Emerging cyberattacks and threats Get Started
Bring yourself up to speed with our introductory content
Client education, advanced endpoint protection and image-based backups are some of the steps channel partners can encourage customers to take to thwart ransomware. Continue Reading
Threat intelligence tools are a phenomenal addition to your security posture; they just can't be your security posture. Learn where they fit into your security Continue Reading
Threat intelligence tools are a phenomenal addition to your security posture; they just can't be your security posture. Learn where they fit into your security scheme. Continue Reading
Evaluate Emerging cyberattacks and threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
DDoS amplification attacks that use the CLDAP protocol are a new threat to enterprises. Expert Matthew Pascucci explains how they work and how enterprises can protect themselves. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the recent cyberattacks on state voter databases and what they could mean for this election season. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the mystery behind the recent Equation Group hack and the motives and identity of the Shadow Brokers. Continue Reading
Manage Emerging cyberattacks and threats
Learn to apply best practices and optimize your operations.
IT systems have changed, development processes have changed and even the business's customers' habits have changed. Why hasn't IT security? Continue Reading
Ever since the internet of things became a "thing," the potential for abuse has been well documented; how best to achieve security for IoT is not yet clear. This Insider Edition of Information Security magazine tackles that second ... Continue Reading
In part two of Risk & Repeat's podcast on the Equation Group, SearchSecurity editors discuss the zero-day vulnerabilities discovered in the Shadow Brokers' data dump. Continue Reading
Problem Solve Emerging cyberattacks and threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A man-in-the-cloud attack is a newer threat to enterprise security and it's not always easy to detect. Expert Frank Siemons explains how the attacks work and what can be done. Continue Reading
You can move your data to cloud-based systems and web services, but you can't hide it there. Hackers and predators have more ways to find it. Continue Reading
WebRTC protocols are being targeted by a new version of the DNSChanger exploit kit. Judith Myerson explains how these attacks work and what enterprises should know. Continue Reading