The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...
COMMENTARYWhile distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In...
PRESS RELEASELONDON, Dec. 20, 2023 — Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the successful completion of...
PRESS RELEASELONDON, Dec. 20, 2023 — Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the successful completion of...
Researchers this week disclosed details on two security vulnerabilities in Microsoft Outlook that, when chained together, give attackers a way to execute arbitrary code...
Concerns are high over a critical, recently disclosed remote code execution (RCE) vulnerability in Apache Struts 2 that attackers have been actively exploiting over...
An espionage group linked to the Russian military continues to use a zero-click vulnerability in Microsoft Outlook in attempts to compromise systems and gather...
Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly...
In the wake of major CDN acquisitions by Akamai, CacheFly stands out as the go-to alternative, offering businesses unmatched speed, reliability, and customer-first flexibility....