IT.COM

cyber security

Spaceship Spaceship
  1. News

    security Trick or Threat: The Monsters Lurking Behind Domains

    So, how can domain names be leveraged to reveal malicious campaigns wreaking havoc on one’s organization? Domain Name System (DNS) and domain datasets offer a wealth of data that can be classified into two main categories: Characterizers and Connectors. The former refers to data points that...
  2. News

    security Trick or Threat: The Monsters Lurking Behind Domains

    So, how can domain names be leveraged to reveal malicious campaigns wreaking havoc on one’s organization? Domain Name System (DNS) and domain datasets offer a wealth of data that can be classified into two main categories: Characterizers and Connectors. The former refers to data points that...
  3. Future Sensors

    security MCH2022 Hacker Camp presentations on YouTube

    For those interested in technology topics, presentations from the MCH2022 hacker camp (July 22 to July 26) are available on YouTube. The May Contain Hackers event is still ongoing, and videos will be added all the time. You can also find videos from the previous event, SHA2017. Enjoy...
  4. Future Sensors

    security MCH2022 Hacker Camp presentations on YouTube

    For those interested in technology topics, presentations from the MCH2022 hacker camp (July 22 to July 26) are available on YouTube. The May Contain Hackers event is still ongoing, and videos will be added all the time. You can also find videos from the previous event, SHA2017. Enjoy...
  5. Future Sensors

    security Mitigate DNS Infrastructure Tampering (CISA)

    Mitigate DNS Infrastructure Tampering (CISA.gov) In late 2018, cybersecurity organizations across the globe started to detect an increase in malicious activity targeting the Domain Name System (DNS) infrastructure on which we all rely. Using common tactics, outlined below, the attackers were...
  6. Future Sensors

    security Mitigate DNS Infrastructure Tampering (CISA)

    Mitigate DNS Infrastructure Tampering (CISA.gov) In late 2018, cybersecurity organizations across the globe started to detect an increase in malicious activity targeting the Domain Name System (DNS) infrastructure on which we all rely. Using common tactics, outlined below, the attackers were...
  7. Future Sensors

    security Cyber security is no longer enough: businesses need cyber resilience

    Cyber security is no longer enough: businesses need cyber resilience Today, we work from anywhere, on more devices, more networks, facing more risk than ever before. Widespread phishing, malware, ransomware attacks, and other frauds pose a risk not just to individuals or platforms, but to...
  8. Future Sensors

    security Cyber security is no longer enough: businesses need cyber resilience

    Cyber security is no longer enough: businesses need cyber resilience Today, we work from anywhere, on more devices, more networks, facing more risk than ever before. Widespread phishing, malware, ransomware attacks, and other frauds pose a risk not just to individuals or platforms, but to...
  9. Future Sensors

    security The Booming Underground Market for Bots That Steal Your 2FA Codes

    The Booming Underground Market for Bots That Steal Your 2FA Codes The bots convincingly and effortlessly help hackers break into Coinbase, Amazon, PayPal, and bank accounts. The call came from PayPal’s fraud prevention system. Someone had tried to use my PayPal account to spend $58.82...
  10. Future Sensors

    security The Booming Underground Market for Bots That Steal Your 2FA Codes

    The Booming Underground Market for Bots That Steal Your 2FA Codes The bots convincingly and effortlessly help hackers break into Coinbase, Amazon, PayPal, and bank accounts. The call came from PayPal’s fraud prevention system. Someone had tried to use my PayPal account to spend $58.82...
  11. Future Sensors

    security How Hackers Are Targeting Cryptocurrency

    How Hackers Are Targeting Cryptocurrency Crypto exchanges that want to maintain credibility must implement some of the same "know your customer" controls used by banks and similar institutions. As the cryptocurrency and digital asset markets mature, so have hackers' approaches to compromising...
  12. Future Sensors

    security How Hackers Are Targeting Cryptocurrency

    How Hackers Are Targeting Cryptocurrency Crypto exchanges that want to maintain credibility must implement some of the same "know your customer" controls used by banks and similar institutions. As the cryptocurrency and digital asset markets mature, so have hackers' approaches to compromising...
  13. Future Sensors

    security Zero Trust Architecture – Applying ZTA in Today's Environment

    Zero Trust Architecture – Applying ZTA in Today's Environment In the wake of the massive breach of computer systems of multiple government agencies discovered in December 2020, the US Federal Government is recommending that a Zero Trust security model be considered for all critical networks. As...
  14. Future Sensors

    security Zero Trust Architecture – Applying ZTA in Today's Environment

    Zero Trust Architecture – Applying ZTA in Today's Environment In the wake of the massive breach of computer systems of multiple government agencies discovered in December 2020, the US Federal Government is recommending that a Zero Trust security model be considered for all critical networks. As...
  15. Future Sensors

    security Ransomware: It's a 'golden era' for cyber criminals - and it could get worse before it gets better

    Ransomware: It's a 'golden era' for cyber criminals - and it could get worse before it gets better The ENISA Threat Landscape report details how ransomware has become the 'prime' cybersecurity threat facing organisations today. Ransomware is the most significant cybersecurity threat facing...
  16. Future Sensors

    security Ransomware: It's a 'golden era' for cyber criminals - and it could get worse before it gets better

    Ransomware: It's a 'golden era' for cyber criminals - and it could get worse before it gets better The ENISA Threat Landscape report details how ransomware has become the 'prime' cybersecurity threat facing organisations today. Ransomware is the most significant cybersecurity threat facing...
  17. Future Sensors

    security WordPress plugin bug impacts 1M sites, allows malicious redirects

    WordPress plugin bug impacts 1M sites, allows malicious redirects CVSS Score: 7.2 (High) The OptinMonster plugin is affected by a high-severity flaw that allows unauthorized API access and sensitive information disclosure on roughly a million WordPress sites. All users of the OptinMonster...
  18. Future Sensors

    security WordPress plugin bug impacts 1M sites, allows malicious redirects

    WordPress plugin bug impacts 1M sites, allows malicious redirects CVSS Score: 7.2 (High) The OptinMonster plugin is affected by a high-severity flaw that allows unauthorized API access and sensitive information disclosure on roughly a million WordPress sites. All users of the OptinMonster...
  19. Future Sensors

    security Russian Hackers Used Home Networks to Evade Detection

    Russian Hackers Used Home Networks to Evade Detection Group behind SolarWinds breach still attacking IT supply chain Residential proxies now tool of choice for cybercriminals When an elite team of Russian government hackers attempted to break into hundreds of intelligence targets this year...
  20. Future Sensors

    security Russian Hackers Used Home Networks to Evade Detection

    Russian Hackers Used Home Networks to Evade Detection Group behind SolarWinds breach still attacking IT supply chain Residential proxies now tool of choice for cybercriminals When an elite team of Russian government hackers attempted to break into hundreds of intelligence targets this year...
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back