Network attacks News
September 28, 2017
A security researcher describes the network lateral movement process from an attacker's perspective and a few key points of focus for IT pros, at DerbyCon.
July 26, 2017
Savvius Spotlight, a new network traffic monitoring tool, launches; ManageEngine boosts its endpoint monitoring; and Cisco forecasts 'destruction-of-service' attacks.
April 21, 2017
Security researchers say the vulnerability behind the infamous Stuxnet worm is still the most exploited in the world, seven years after being patched.
December 15, 2016
A second Yahoo breach was disclosed, with more than 1 billion accounts compromised and users left at risk of further attacks for three years.
Network attacks Get Started
Bring yourself up to speed with our introductory content
Effective incident response policies must be detailed, comprehensive and regularly updated -- and then 'embedded in the hearts and minds' of infosec team members. Continue Reading
Expert Ed Tittel describes how threat intelligence platforms work to help in the proactive defense of enterprise networks. Continue Reading
While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now, with operators opening the SS7 network to offer third-party access as a commercial offering, vulnerabilities are being exposed and attacked. Continue Reading
Evaluate Network attacks Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
After 2016's Mirai botnet, the world has been bracing for the IoT attack era. When will that day come? Christopher Budd of Palo Alto Networks discusses. Continue Reading
Expert Karen Scarfone examines the features of Aruba RFProtect, a wireless intrusion prevention system to detect and block WLAN attacks against enterprise networks. Continue Reading
Expert Karen Scarfone looks at the features and functionality of the Cisco Adaptive Wireless IPS, a wireless intrusion prevention system to monitor and protect WLANs. Continue Reading
Manage Network attacks
Learn to apply best practices and optimize your operations.
With the WikiLeaks Cherry Blossom project, attackers can potentially inject malicious firmware into wireless routers. Expert Michael Cobb explains how to stop it from happening. Continue Reading
Enterprises looking to perform IPv6 address scans can use DNS reverse mapping techniques. In part one of this tip, expert Fernando Gont explains how the process works. Continue Reading
With mobile devices on the rise in the workplace, it is imperative to know the top security threats these devices bring with them, plus how to prevent breaches from happening. Continue Reading
Problem Solve Network attacks Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Need to learn how to secure a Wi-Fi network? You'll need to be both flexible and focused, given the growing threats and multiplying devices riding on most networks now. Continue Reading
A Linux vulnerability that affects 80% of Android devices allows for attacks on TCP communications and remote code execution. Expert Michael Cobb explains how to mitigate these risks. Continue Reading
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these VPN-enabled threats. Continue Reading