1,090 Results for:proxy

  • Sort by: 

How to avoid malware on Linux systems

By Jack Wallen 23 Jan 2024

Malware attacks are devastating to companies, and there is no exception for Linux systems. Consider updating systems and assigning correct permissions. Read More

Majority of UK employees ‘willingly gamble’ with security

By Alex Scroxton 27 Feb 2024

Human-centric threats originating from employees continue to damage organisations both financially and reputationally, according to a report Read More

Recorded Future sheds light on Iranian hacking operations

By Rob Wright 22 May 2018

Recorded Future's Levi Gundert discusses how the Iranian government uses proxies and contractors to launch cyberattacks, and how its strategy presents challenges for the country. Read More

Sidecarless service mesh: Fad or the future?

By Beth Pariseau 28 Oct 2022

Istio's experimental Ambient Mesh is gathering buzz with the promise of simpler operations, but Linkerd loyalists contend that the sidecar itself isn't the real problem. Read More

A UPnP vulnerability hides bad traffic in a new way

By Madelyn Bacon 13 Apr 2018

News roundup: Home routers are susceptible to a UPnP vulnerability that proxies bad traffic in a new way. Plus, AMD and Microsoft released patches for the Spectre flaw, and more. Read More

Breaking the cycle of algorithmic bias in AI systems

By Lev Craig 17 Apr 2023

As powerful organizations begin to integrate models such as GPT-4, ensuring fair and equitable access to resources of all kinds requires open discourse about algorithmic bias in AI. Read More

How can hackers bypass proxy servers?

By Ed Skoudis 09 Apr 2007

Hackers are bypassing proxy servers all the time and doing so for a variety of reasons. In this SearchSecurity.com expert Q&A, Ed Skoudis points out the holes in your protective filtering tools. Read More

Microsoft issues new warning over Chinese cyber espionage

By Alex Scroxton 13 Jul 2023

A newly uncovered Chinese espionage campaign exploited forged authentication tokens to access its victims’ email accounts, says Microsoft Read More

Top.gg supply chain attack highlights subtle risks

By Alexander Culafi, Beth Pariseau 26 Mar 2024

Threat actors used fake Python infrastructure and cookie stealing to poison multiple GitHub code repositories, putting another spotlight on supply chain risks. Read More

Backup admins must consider GenAI legal issues -- eventually

By Tim McCarthy 22 Jan 2024

As legal woes mount against popular LMMs powering generative AI, backup admins should work with IT to set safe and effective usage guardrails to avoid future headaches. Read More