Targeted attack News
July 02, 2015
Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.
June 29, 2015
Following major breaches at retail giants, government agencies and others, cloud's reputation has taken a hit. But cloud may not be entirely to blame.
April 14, 2015
The new 'Redirect to SMB' vulnerability is an update to an 18-year-old flaw that can lead to man-in-the-middle attacks on all versions of Windows.
March 27, 2015
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
Targeted attack Get Started
Bring yourself up to speed with our introductory content
Security startups are using the techniques of polymorphic malware to better protect enterprises. Expert David Strom explores the moving target defense. Continue Reading
In general, Web conferencing service security is tight, but experts warn some gaps could be exposed. Find out what safeguards to put in place to keep your data secure. Continue Reading
Expert Fernando Gont explains why underlying characteristics of IPv6 address-generation schemes may enable nodes to be targeted in IPv6 address-scanning attacks. Continue Reading
Evaluate Targeted attack Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Reviewing credential dumps could potentially save identity information from being stolen and used in a data breach. Expert Randall Gamby explains why it's worth the extra work. Continue Reading
Smartphones with gyroscopes can be exploited to serve as an eavesdropping tool. Expert Nick Lewis explains how to mitigate smartphone gyroscope risk. Continue Reading
The sophisticated Regin malware contains features that hackers can adopt into other enterprise malware threats. Expert Nick Lewis explains how to combat this risk. Continue Reading
Manage Targeted attack
Learn to apply best practices and optimize your operations.
The era of mobile, cloud and the Internet of Things is also an era of advanced persistent threats, ransomware and more. Here's how to stay secure. Continue Reading
The constant evolution of data threats is forcing companies to continuously monitor and assess security controls to ensure they can adapt to new risks. Continue Reading
Managing information security in a breach-a-day climate is no picnic. In this Essential Guide, we prepare CIOs for the challenge. Continue Reading
Problem Solve Targeted attack Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprise threats expert Nick Lewis offers advice on how to defend against the SoakSoak malware targeting insecure WordPress sites. Continue Reading
Differentiating between insider and non-insider malware threats can be challenging. Expert Nick Lewis offers pointers for distinguishing malware coders from internal threats. Continue Reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask. Continue Reading