2 Website Threats to Address for the Holiday Shopping Rush
December 13 2021Some tips for effectively combating Web supply chain attacks and customer hijacking via browser extensions.
Read moreSome tips for effectively combating Web supply chain attacks and customer hijacking via browser extensions.
Read moreFind out how to deal with the Log2Shell vulnerability right across your estate. Yes, you need to patch, but that helps everyone else along with you!
Read moreThis Tech Tip outlines how enterprise defenders can mitigate the risks of the Log4j vulnerabilities for the short-term while waiting for updates.
Read moreThe Far Side is always good for a squid reference. Here’s a recent one. As usual, you can also use this squid post to talk about the security stories in...
Read moreA remote code execution vulnerability in Log4j presents a bigger threat to organizations than even the infamous 2017 Apache Struts vulnerability that felled Equifax, they say.
Read moreThe latest NIST publication outlines how organizations can build systems that can anticipate, withstand, recover from, and adapt to cyberattacks.
Read moreOleg Koshkin was sentenced for running a crypting service used to hide the Kelihos malware from antivirus software.
Read moreThe Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought...
Read moreJust when you thought it was safe to relax for the weekend... a critical bug showed up in Apache's Log4j product
Read more
Recent Comments