Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.
Nearly Half of Organizations Targeted Again Within a Year of Suffering a ‘Significant’ Cyberattack, Report Reveals
Nearly half of organizations that suffered a "significant" cyberattack fell victim to bad actors again within a year's time, a recent security trends report revealed.
The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
CCleaner was compromised at the main distribution site to include a malware attack. The Floxif attack is a downloader that breached the app supply chain.
With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
An attack doesn't need a special file to be malicious; it can use previously existing system structures, prompting the need for new security tools.