Infosecurity Blogs

  1. Protecting Your Business as DDoS Attacks Set to Surge

    From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  2. ID Authentication Bypass and the Next Evolution in Phishing Campaigns

    New insights highlight the sophistication of modern phishing packages available to budding fraudsters

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  3. The Increasingly Complex Threat Landscape Must Be Fought With Simplicity

    New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack

    1. Photo of Dan Turner

      Dan Turner

      VP for Forcepoint G2CI, Forcepoint

  4. Interactive Malware Sandbox in Your Security System

    Understand how to overcome the issues of traditional antiviruses with an online malware sandbox

    1. Photo of Stas Gaivoronskii

      Stas Gaivoronskii

      Malware Analyst, ANY.RUN

  5. Template Injection Attacks: Mitigating Modern Threats

    The Menlo Labs Team has recently observed a spike in template injection attacks

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  6. An Analysis of Security Vulnerability Trends During COVID-19

    What were the security vulnerability trends during COVID-19?

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  7. Why Zero Trust and Identity and Access Management are Essential to Enterprise Security

    Discover why turning to Zero Trust is important to be able to secure an organization's operations

    1. Photo of Russell Dowdell

      Russell Dowdell

      Senior Manager, Product Management, SecureLink

  8. Combating CNI Security Concerns in a Complex Climate

    An attack on critical infrastructure remains an ongoing concern for cybersecurity professionals and there is a need for best practices to be followed

    1. Photo of Dan Turner

      Dan Turner

      VP for Forcepoint G2CI, Forcepoint

  9. Cross-Functional Collaboration is Becoming Essential for Security Professionals

    The threats facing organizations today are too numerous and complex to be dealt with exclusively by the security team

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  10. Qakbot: Analysing a Modern-Day Banking Trojan

    Attackers are using increasingly innovative methods to launch the Qakbot Trojan

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  11. Initial Access Brokers and Blocking the Continued March of Ransomware

    IABs have made ransomware attacks easier for affiliate groups and organizations need to respond

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  12. Observing the Changing Nature of Security within Organizations

    Understand why an organization's security posture must align with business objectives

    1. Photo of Rich Foltak

      Rich Foltak

      CISO, Dito

  13. Fixing Our Breaking Human Controls

    Jenai Marinkovic argues that more empathy is required to mitigate cyber-threats

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  14. How to Solve Third-Party Remote Access Problems in Manufacturing

    Under Industry 4.0 securing OT, ICS and PLC systems is more important than ever before

    1. Photo of Tori Taylor

      Tori Taylor

      Marketing Communications Specialist, SecureLink

  15. The Role of Cloud Services in the Hybrid War in Ukraine

    Threat actors linked to the Russia-Ukraine war are increasingly seeking to exploit cloud services

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  16. Outsourcing Cyber Risk: Why an Integrated Approach is Critical

    While many organisations are looking for a silver bullet to combat all threats, there is no such thing as a one-size-fits-all approach

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  17. Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks

    The threat actor was likely to have been of Chinese origin

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  18. The Challenge of Shadow OT

    No matter how your ICS/OT environment is connected, it needs to be secured

    1. Photo of Paul Holland

      Paul Holland

      Cyber Capability Manager, Royal Mail

  19. Keeping up with the Attackers: Educating Staff on New Monkeypox Themed Phishing Campaigns

    Threat actors exploit public wariness surrounding new medical concerns

    1. Elmer Hernandez

      Threat analyst, Cofense

  20. How Russian Information Operations Are Trying to Win the War

    A whole-of-community response is required to counter Russian attempts to undermine and divide the Western coalition

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

What’s Hot on Infosecurity Magazine?