John Frasier

1 min read

Articles of interest from the week of March 7, 2022

How Attackers Sidestep the Cyber Kill Chain Many of the most popular cyberattacks don't follow all the steps of the cyber kill chain, but you have other methods to detect threats. (By Maria Korolov, CSO)

Read More

1 min read

Articles of interest from the week of February 21, 2022

Attackers Hone Their Playbooks, Become More Agile Cybercriminals and nation-state actors adapted to defenders' tactics and became more efficient in...

Read More

1 min read

Articles of interest from the week of February 7, 2022

MFA Still Offers the Best Chance of Keeping Data Secure These best practices explain why MFA remains one of the best defenses for mitigating password...

Read More

1 min read

Articles of interest from the week of January 24, 2022

Lazarus Hackers Use Windows Update To Deploy Malware North Korean-backed hacking group Lazarus has added the Windows Update client to its list of...

Read More

1 min read

Articles of interest from the week of January 10, 2022

FTC to Go After Companies that Ignore Log4j Companies that fail to protect consumer data from Log4J attacks are at risk of facing Equifax-esque legal...

Read More

1 min read

Articles of interest from the week of December 27, 2021

Top 7 Common Cybersecurity Myths — Busted Even with the growing awareness about cybersecurity, many myths about it are prevalent. These...

Read More

1 min read

Articles of interest from the week of December 13, 2021

Second Log4j Vulnerability (CVE-2021-45046) Discovered — New Patch Released The Apache Software Foundation (ASF) has pushed out a new fix for the...

Read More
 

Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Subscribe-to-NetSec-News-v4-1