Network Security | News, how-tos, features, reviews, and videos
Six holes in the configuration migration tool could allow theft of cleartext passwords and more.
New phishing campaigns attempt to evade detection by constructing rogue QR codes with special ASCII characters and load phishing pages locally using the local blob URL feature in browsers.
Tighter integration among Juniper's AI-driven security products is aimed at promoting consistency in security policies and strengthening collaboration between networking and security teams.
The European Union is now arguing various versions of encryption backdoor rules, but they are not expected to agree on much. Their members, though, are likely to each create their own contradictory rules.
Aryaka expands its unified SASE platform with CASB, AI optimization, and interactive testing capabilities.
A document written by the Australian Cyber Security Centre and supported by the NSA and security agencies in the UK, Germany, Korea and elsewhere, outlines six principles for securing OT systems.
An upswing in hacktivist activity is behind the big rise in attacks aiming to saturate and overwhelm the resources of governments, utilities, and financial services, a report from Netscout reveals.
Despite White House encouragement to implement RPKI, the protocol is not yet stable or secure enough, according to a team of German researchers.
The scale of the attack shows an ever-increasing amplification of distributed denial-of-service attempts, aided in part by the growing number of vulnerable or poorly secured IoT devices.
With plenty of pentesting tools out there you must know how they work and which fits the use case you are interested in testing. CSO selected 14 underrated tools and what they are best for.