New & Notable

News

Salt Typhoon compromises telecom providers' Cisco devices

Salt Typhoon's latest campaign exploits older vulnerabilities in Cisco edge devices to gain access to the networks of several telecom companies, including two based in the U.S.

News

Fortinet discloses second authentication bypass vulnerability

Fortinet disclosed CVE-2025-24472 in an updated advisory that confused some in the infosec community because it stated that 'reports show this is being exploited in the wild.'

Evaluate

Benefits and challenges of passkeys in the enterprise

Passkeys overcome some of the critical security vulnerabilities plaguing passwords. But enterprises face some new challenges when deploying the authentication technology.

Problem Solve

How to build an API security strategy

Lax API protections make it easier for threat actors to steal data, inject malware and perform account takeovers. An API security strategy helps combat this.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a denial-of-service attack?

    A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other IT resources.

  • Get Started

    What is cyber hijacking?

    Cyber hijacking, or computer hijacking, is a type of network security attack in which the threat actor takes control of computer systems, software programs and network communications.

  • Get Started

    What is antimalware?

    Antimalware is a software program created to protect IT systems and individual computers from malicious software, or malware.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security