1 min read

Articles of interest from the week of June 13, 2022

Verizon DBIR: Stolen Credentials Led to Nearly 50% of Attacks

The Verizon 2022 Data Breach Investigations Report revealed enterprises' ongoing struggle with securing credentials and avoiding common mistakes such as misconfigurations. (By Arielle Waldman, TechTarget)


“Browser in the Browser” Attacks: A New Phishing Technique Arises

A phishing technique called Browser in the Browser (BITB) has emerged, and it’s already aiming at government entities, including Ukraine. Find out how to protect against this new threat. (By Cedric Pernet, TechRepublic)


Hacking Scenarios: How Hackers Choose Their Victims

When hackers hack, they do so for several reasons. We've listed the 4 most common motivations behind the hacking. (By The Hacker News)


Paying Ransomware Paints Bigger Bullseye on Target’s Back

Paying ransomware attackers doesn’t pay off and often paints a bigger target on a victim’s back. Eighty percent of ransomware victims that paid their attackers were hit a second time by the malware scourge. (By Nate Nelson, Threatpost)


CISA Outlines Bad Practices Every Organization Should Avoid

There are a few bad IT practices that are dangerous for any organization and particularly for organizations in critical industries like healthcare. At the RSA Conference 2022, the Cybersecurity and Infrastructure Security Agency (CISA) outlined what the US Government sees as the three most critical bad practices for IT today. (By Sean Michael Kerner, Infosecurity Magazine)

Sign Up For Network Security News

Articles of interest from the week of August 26, 2019

IRS Issues Warning on New Email Phishing Scam A new email phishing scam involving false claims about electronically filed tax returns was reported...

Read More

Articles of interest from the week of February 7, 2022

MFA Still Offers the Best Chance of Keeping Data Secure These best practices explain why MFA remains one of the best defenses for mitigating password...

Read More

Articles of interest from the week of October 21, 2019

Sudo Bug Opens Root Access on Linux Systems The bug allows users to bypass privilege restrictions to execute commands as root. (By Tara Seals, ...

Read More