A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
University of Maryland researchers warn that with limited resources, threat actors could launch a successful cyberattack on Google's bot-detecting reCaptcha service.
By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.
During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.
A robust, documented incident response plan is the foundation of a successful automation and orchestration program — but where do you begin?
The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence.
Analysts discovered a new spear phishing attack campaign from the SNAKEMACKEREL group that uses fake Brexit-related documents to infiltrate major government agencies and steal information.
IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.
It's time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.
To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.