412 Results for:DOS

  • Sort by: 

Fighting wireless DoS attacks

By Lisa Phifer 10 Apr 2006

Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they... Read More

A technical expert's guide to software product design

By Jenner Lochridge 25 May 2016

When initiating a new project, there are a number of dos and don'ts when it comes to software product design you need to be aware of. Read More

Decades-old bug in the libpng open source graphics library patched

By Peter Loshin 03 Jan 2017

A low-severity vulnerability dating back to 1995 in libpng, the official reference library implementation for PNG, may have enabled remote DoS attacks. Read More

Forescout proof-of-concept ransomware attack affects IoT, OT

By Alexander Culafi 01 Jun 2022

Forescout's proof of concept showed how an attacker could use an IoT camera to gain access to an enterprise's IT network and then shut down operational technology hardware. Read More

Top incident response tools: How to choose and use them

By Kevin Beaver 09 Jan 2024

The OODA loop helps organizations throughout the incident response process, giving insight into the incident response tools needed to detect and respond to security events. Read More

Identidade digital descentralizada: o poder das pessoas sobre seus dados

20 Jan 2022

A ideia por trás da Identidade Digital Descentralizada é que cada usuário tenha a sua própria “carteira” digital com todas as suas credenciais de identidade fornecidas por emissores autorizados, seja ele o governo ... Read More

Onapsis researchers detail new SAP security threats

By Arielle Waldman 09 Aug 2023

At Black Hat 2023, Onapsis researchers demonstrated how attackers could chain a series of SAP vulnerabilities impacting the P4 protocol to gain root access to a target network. Read More

7 guidelines to secure network storage

By Julia Borgini 23 Aug 2022

These practices, including firmware and VPN guidance, protect NAS devices. Use these steps as standalone procedures or incorporate them into your overall security process. Read More

Log4j gets a second update as security woes pile up

By Shaun Nichols 15 Dec 2021

Administrators who were already scrambling to patch up the Log4Shell flaw are now being advised to update to Log4j version 2.16.0 following the discovery of issues in 2.15.0. Read More

10 cloud vulnerabilities that can cripple your environment

By Stephen J. Bigelow 17 Apr 2024

Enterprises can be devastated by security-related weaknesses or flaws in their cloud environments. Find out where you are most vulnerable before an attacker comes knocking. Read More