Network Security | News, how-tos, features, reviews, and videos
The Black Hat series of international cybersecurity conferences brings together top IT security pros, researchers, and thought leaders to discuss the latest cyber techniques, vulnerabilities, threats, and more. Here’s the latest to know.
Black Hat conference attendees heard a post-mortem on the KeyTrap DNSSEC vulnerability, which could have widely impacted browsing, email, TLS, and other key web services.
The Salt Typhoon intrusion gives China a chance to exfiltrate massive amounts of data from most organizations, especially voice calls that can be stored for later use in deepfake campaigns.
The biggest hack since the Aurora attacks of 2009 used traditional vectors and vulnerabilities rather than novel hacking techniques, CISA says.
The no-click exploit launched in October infected computers in Europe and North America with the RomCom backdoor when victims were redirected through attacker-controlled websites.
Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement them.
Popular security tools are getting abused in growing attacks as miscreants move to non-technical and brute-forcing methods.
Attackers are chaining two flaws in the wild to bypass authentication and escalate privileges via the PAN-OS management web interface to gain root privileges on Palo Alto Networks firewalls.
Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.
Critical flaw affects URWB access points used in outdoor and industrial environments.