Passive DNS replication can be an essential source of data to contextualize your threat intelligence and inform your incident response plan.
According to a recent study, just 1 percent of U.S. media companies reported high levels of confidence in their ability to withstand a variety of media security attacks.
Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
The Angler exploit kit has been responsible for the vast majority of botnets created over the past year. Here's how it works and how to stop it.
New DNS server attacks are exploiting a flaw in the open-source BIND9, and websites at risk for attack need to move quickly to patch the problem.
The evolution of threat kinetics to identity kinetics is rapidly advancing, and there are a plethora of organizations pursuing this avenue.
Monitoring a honeypot name server for queries in a public cloud is an easy and popular way of collecting data on "Internet noise."