Web Application Attacks Grow Reliant on Automated Tools
February 4 2021Attackers often use automation in fuzzing attacks, injection attacks, fake bots, and application DDoS attacks.
Read moreAttackers often use automation in fuzzing attacks, injection attacks, fake bots, and application DDoS attacks.
Read moreFacebook, Instagram, TikTok, and Twitter this week all took steps to crack down on users involved in trafficking hijacked user accounts across their platforms. The coordinated action seized hundreds...
Read moreNew episode - listen now!
Read moreOnly try this at home, folks! As easy as it might look, it's illegal in the wild, with good reason.
Read moreLofty bug bounties catch attention, but don't alleviate the application security flaws they are trying to solve.
Read more
At the same time the Russians were using a backdoored SolarWinds update to attack networks worldwide, another threat actor — believed to be Chinese in origin — was using...
Read moreIncomplete patches are allowing attackers to continue exploiting the same vulnerabilities, reducing the cost to compromise.
Read moreTraditional monitoring approaches are proving brittle as security operations teams need better visibility into dynamic environments.
Read moreSolarWinds' CEO says evidence indicates attackers lurked in the company's Office 365 email system for months ahead of the attack.
Read moreLearn why it's way better to rehearse what to say if you suffer a data breach than to make it up as you go along.
Read more
Recent Comments