Tag: attack

Here you will find all the articles with the tag: attack.

What is ‘credential stuffing’ and how do you defend against it?

What is ‘credential stuffing’ and how do you defend against it?

Okta and Cisco recently warned of an unprecedented spike in "credential stuffing" attacks. What does that entail? And what do you do about it? Credential stuffing involves an attacker using account information stolen elsewhere to get into a particular account. If someone's credentials were captu... Read more

date27 days ago
Google enhances Chrome security for remote workers

Google enhances Chrome security for remote workers

Google will soon begin testing adding Private Network Access (PNA) technology on the Google Chrome Enterprise and Education versions of the browser Chrome. The addition will provide enhanced security aimed primarily at remote workers. According to the tech giant, the new feature in its Chrome b... Read more

date3 months ago
Russia-backed hackers attack Microsoft: senior leadership hacked

Russia-backed hackers attack Microsoft: senior leadership hacked

Russian-backed hackers managed to gain access to the mail accounts of important people within Microsoft. Microsoft itself reported this in a blog post last night. Customers need not worry about this hack, the company indicated. However, internal procedures may be tightened a bit. The group behin... Read more

date4 months ago
HR topics used the most as attack method in phishing attacks

HR topics used the most as attack method in phishing attacks

HR-related topics are the most commonly used among hackers to enable phishing attacks. The tactic is far from new, but it generates successful attacks time and again. Those are the findings from research done by KnowBe4. E-mail phishing is still very popular among hackers and generates a lot of ... Read more

date7 months ago
Researchers foil MitM attack on military robots with algorithm

Researchers foil MitM attack on military robots with algorithm

Australian researchers at UniSA University have succeeded in preventing Man-in-the-Middle (MitM) attacks on autonomous military robots. They did so using an algorithm that taught the robot to detect MitM attacks. In the experiment, researchers from Australian universities succeeded in preventing... Read more

date7 months ago
Cloudflare detects a new type of DDoS, inspired by an acoustic beat

Cloudflare detects a new type of DDoS, inspired by an acoustic beat

Someone has put a new spin on the good old DDoS attack. This new one is inspired by an acoustic beat, of all things. The attack was first spotted by the web infrastructure firm, Cloudflare. It comes as pulsating waves instead of bombarding a site in the old style. This attack simulates the beat ... Read more

date3 years ago