Network security
Enterprise cyberdefense strategies must include network security best practices. Get advice on essential network security topics such as remote access, VPNs, zero-trust security, NDR, endpoint management, IoT security, hybrid security, Secure Access Service Edge, mobile security and more.
Top Stories
- 
				Opinion
					24 Oct 2025
					
									
										  Cybersecurity Awareness Month: The endpoint security issueDevice diversity and hybrid work models challenge IT teams. New research reveals the gap between managed endpoints and actual security coverage. Continue Reading By- Gabe Knuth, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
				Opinion
					21 Oct 2025
					
									
										  How single-vendor SASE can deliver better security resultsSASE vendor deployment trends show gradual change, with single-vendor adoption rising from 2% in 2023 to 17% in 2025, according to research findings. Continue Reading By- John Grady, Principal Analyst
 
- 
                Definition
                20 Oct 2025
                  What is an IP address (Internet Protocol address)?An Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet. Continue Reading By- Paul Kirvan
- Kinza Yasar, Technical Writer
 
- 
                Tip
                16 Oct 2025
                  7 top deception technology vendors for active defenseOnce reserved for the most mature organizations, cyber deception technology is picking up steam on the ground and in practice. Here are seven platforms for CISOs to consider. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                26 Sep 2025
                  What to know about 5G security threats in the enterpriseLearn about key 5G security threats facing enterprises, plus practical defense strategies for CISOs. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                18 Sep 2025
                  What is hardware security?Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system's hardware. It also refers to the protection of physical systems from harm. Continue Reading By- Nick Barney, Technology Writer
- Kinza Yasar, Technical Writer
 
- 
                Tutorial
                17 Sep 2025
                  How to use arp-scan to discover network hostsAn arp-scan delivers a fast, focused scan of an organization's local subnet. It is not fancy, but it's an easily controlled method to learn exactly what's connected. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Definition
                09 Sep 2025
                  What is crisis communication?Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event. Continue Reading By- Paul Kirvan
- Rahul Awati
- Paul Crocetti, Editorial Director
 
- 
                Definition
                03 Sep 2025
                  What is file integrity monitoring (FIM)?File Integrity Monitoring (FIM) is a security process that continuously monitors and analyzes the integrity of an organization's assets by comparing them against a trusted baseline to detect unauthorized changes or suspicious activity. Continue Reading By- Kinza Yasar, Technical Writer
 
- 
                Definition
                28 Aug 2025
                  What is network security? Definition and best practicesNetwork security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Continue Reading By- Kinza Yasar, Technical Writer
- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
 
- 
                Tutorial
                27 Aug 2025
                  How to use Masscan for high-speed port scanningMasscan delivers a quick assessment of open ports and listening services, but it helps to pair the utility with other scanning tools, such as Nmap. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Tutorial
                26 Aug 2025
                  How to use Netdiscover to map and troubleshoot networksRead installation info, basic commands and practical applications for Netdiscover, an ARP-based tool that identifies live hosts, detects unauthorized devices and enhances security. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Tutorial
                19 Aug 2025
                  Use ssh-keygen to generate new key pairs: A full tutorialUse ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Tutorial
                15 Aug 2025
                  SSH tunneling explained: A tutorial on SSH port forwardingSSH tunneling creates secure encrypted connections through private and untrusted networks, enabling remote access, bypassing restrictions and protecting sensitive data transfers. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Feature
                11 Aug 2025
                  How to use Nmap to scan ports: A complete tutorialNmap is a versatile open source security tool that scans ports to identify vulnerabilities, test firewall rules, inventory networks and troubleshoot connectivity issues. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Tip
                08 Aug 2025
                  How to prevent DoS attacks and what to do if they happenThe worst DoS attacks are like digital tsunamis that put critical business operations at risk. Learn how they work, ways to stop them and how systems can withstand the flood. Continue Reading By
- 
                Feature
                08 Aug 2025
                  Experts weigh in on securing AI effectivelyUsing AI comes with security risks. Learn what the top attack vectors and privacy threats are, then discover how to mitigate them through proper strategy, monitoring and more. Continue Reading By- Brenda L. Horrigan, Executive Managing Editor
 
- 
                Definition
                07 Aug 2025
                  What is COMSEC (communications security)?Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred. Continue Reading By- Paul Kirvan
- Ben Cole, Executive Editor
 
- 
                Definition
                07 Aug 2025
                  What is the Mitre ATT&CK framework?The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies. Continue Reading By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
 
- 
                News
                07 Aug 2025
                  U.S. still prioritizing zero-trust migration to limit hacks' damageThe zero-trust initiative, which gained steam during the Biden administration, is still underway. Continue Reading - 
                Video
                06 Aug 2025
                  An explanation of quantum cryptographyQuantum cryptography uses photons to transmit keys securely through quantum properties, creating an unhackable system that outperforms traditional math-based encryption methods. Continue Reading By- Sabrina Polin, Managing Editor
 
- 
                Video
                05 Aug 2025
                  AI security: Top experts weigh in on the why and howAI is everywhere, so security focus on this new technology is essential. In this podcast episode, three top security experts review the risks and discuss ways to mitigate them. Continue Reading By
- 
                Definition
                05 Aug 2025
                  What is IoT security?IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things. Continue Reading By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Sharon Shea, Executive Editor
 
- 
                Answer
                30 Jul 2025
                  The differences between inbound and outbound firewall rulesFirewalls can support both inbound and outbound firewall rules, but there are important differences between the two. Learn more about each and their uses. Continue Reading By- Michael Cobb
- Kevin Beaver, Principle Logic, LLC
 
- 
                Tip
                28 Jul 2025
                  How mobile firewalls protect against enterprise threatsFirewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for organizations. Continue Reading By- Reda Chouffani, Biz Technology Solutions
 
- 
                Definition
                28 Jul 2025
                  What is a content delivery network?A content delivery network (CDN), also called a content distribution network, is a group of geographically distributed and interconnected servers. Continue Reading By- Mary E. Shacklett, Transworld Data
- Kinza Yasar, Technical Writer
 
- 
                Tip
                25 Jul 2025
                  How to discover and manage shadow APIsConnecting applications, especially if external-facing, with unapproved APIs is a recipe for disaster. Detecting and managing shadow APIs is vital to keeping the company secure. Continue Reading By- Dave Shackleford, Voodoo Security
 
- 
                Video
                22 Jul 2025
                  An explanation of firewall types and usesFirewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access. Continue Reading By- Sabrina Polin, Managing Editor
 
- 
                Tip
                15 Jul 2025
                  What is cybersecurity mesh? Key applications and benefitsIs it time to consider a different approach to security architecture? Cybersecurity mesh might be an effective way to address complex, distributed environments. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Definition
                08 Jul 2025
                  What is the domain name system (DNS)?The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses. Continue Reading By- Mary E. Shacklett, Transworld Data
- Ben Lutkevich, Site Editor
- John Burke, Nemertes Research
 
- 
                Feature
                08 Jul 2025
                  How to implement zero trust: 7 expert stepsZero trust means a lot more than determining how users access resources. Successful implementation takes time, commitment and ongoing support. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
- Alissa Irei, Senior Site Editor
 
- 
                Feature
                07 Jul 2025
                  What is the future of cybersecurity?As cyberthreats grow more sophisticated, enterprises face mounting challenges. What does the future of cybersecurity hold, and how can organizations stay ahead? Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                02 Jul 2025
                  What is a message authentication code (MAC)? How it works and best practicesA message authentication code (MAC) is a cryptographic checksum applied to a message to guarantee its integrity and authenticity. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Robert Sheldon
 
- 
                Definition
                02 Jul 2025
                  What is SIEM (security information and event management)?SIEM (security information and event management) is software that helps organizations detect, analyze, and respond to security threats by collecting and correlating security event data from across the IT environment in real time. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Linda Rosencrance
 
- 
                Tip
                02 Jul 2025
                  How to build a cybersecurity strategy and plan in 4 stepsA cybersecurity strategy isn't meant to be perfect, but this high-level plan must be proactive, effective, actively supported and evolving. Here are four key steps to get there. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                30 Jun 2025
                  What is the ISO 31000 Risk Management standard?The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Brien Posey
 
- 
                Video
                30 Jun 2025
                  Ransomware: Examples, prevention and mitigating the damageTop cybersecurity experts gathered to discuss the latest threats from ransomware and how organizations, large and small, can prevent or, at least, mitigate an attack. Continue Reading By
- 
                Tip
                27 Jun 2025
                  Cybersecurity skills gap: Why it exists and how to address itThe cybersecurity skills shortage is putting enterprises at risk. Worse, it shows no sign of abating. Here is why it's happening and what employers can do to mitigate the problem. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                25 Jun 2025
                  10 remote work cybersecurity risks and how to prevent themLarger attack surfaces, limited oversight of data use, AI-driven attacks and vulnerable enterprise technologies are among the security risks faced in remote work environments. Continue Reading 
- 
                Tip
                24 Jun 2025
                  Cybersecurity governance: A guide for businesses to followCybersecurity governance is now critical, with NIST CSF 2.0 recently adding it as a dedicated function. Learn why governance is core to an effective cyber strategy. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                23 Jun 2025
                  What is a SYN flood DoS attack?A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a 'half-open attack.' Continue Reading By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
 
- 
                Tip
                23 Jun 2025
                  How to choose a cybersecurity vendor: 12 key criteriaChoosing a cybersecurity vendor entails a two-phase approach: shortlisting vendors using clear requirements, then conducting thorough evaluations based on key criteria. Here's how. Continue Reading 
- 
                Definition
                20 Jun 2025
                  What is perfect forward secrecy (PFS)?Perfect forward secrecy (PFS), also known as forward secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers. Continue Reading 
- 
                Definition
                18 Jun 2025
                  What is an advanced persistent threat (APT)?An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Linda Rosencrance
 
- 
                Opinion
                16 Jun 2025
                  Zscaler delivers network, data security tools at Zenith LiveZscaler has expanded beyond ZTNA with three strategic pillars and aims to challenge traditional security infrastructure. Continue Reading By- John Grady, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                News
                11 Jun 2025
                  Cisco Isovalent Load Balancer takes aim at Broadcom's VMwareThe new product promises to simplify disparate network traffic across cloud, hybrid and on-premises workloads. Continue Reading By- Shane Snider, Senior News Writer
 
- 
                Definition
                11 Jun 2025
                  What is ransomware as a service (RaaS)?Ransomware as a service (RaaS) is a subscription-based business model that enables threat actors, also called affiliates, to launch ransomware attacks by accessing and using predeveloped ransomware tools. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Sean Michael Kerner
 
- 
                Feature
                06 Jun 2025
                  How to choose and set up a mobile VPN for an Android phoneA tailored approach to network security is crucial when managing smartphones in the enterprise. IT teams should consider Android VPN options for their organization. Continue Reading 
- 
                Definition
                05 Jun 2025
                  What is the WannaCry ransomware attack?WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS). Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Linda Rosencrance
 
- 
                Definition
                02 Jun 2025
                  What is a next-generation firewall (NGFW)?A next-generation firewall (NGFW) is a network security device that combines traditional firewall capabilities with advanced features to detect and block sophisticated cyberattacks. Continue Reading By- Casey Clark, TechTarget
- Sharon Shea, Executive Editor
 
- 
                Feature
                29 May 2025
                  How to choose and set up a mobile VPN for an iPhoneMany users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems. Continue Reading 
- 
                Definition
                28 May 2025
                  What is double extortion ransomware? How to defend your organizationDouble extortion ransomware is a type of cyberattack that encrypts a victim's data, like in a traditional ransomware attack, while also adding a second attack vector of stealing that data. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Sean Michael Kerner
 
- 
                Tip
                20 May 2025
                  How to create a remote access policy, with templateRemote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy. Continue Reading By
- 
                Definition
                19 May 2025
                  What is a firewall and why do I need one?A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules. Continue Reading By- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
 
- 
                Answer
                13 May 2025
                  How can an enterprise mobile VPN fit into a mobility plan?Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN. Continue Reading 
- 
                Opinion
                07 May 2025
                  Key network security takeaways from RSAC 2025Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats. Continue Reading By- John Grady, Principal Analyst
 
- 
                Tutorial
                07 May 2025
                  How to use arpwatch to monitor network changesThe arpwatch utility flags administrators in the event of any unexpected changes or unauthorized devices, which could signal ARP spoofing or credential-harvesting attacks. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Definition
                23 Apr 2025
                  What is ransomware? Definition and complete guideRansomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. Continue Reading By- Sharon Shea, Executive Editor
- Alissa Irei, Senior Site Editor
 
- 
                Definition
                21 Apr 2025
                  What is a mobile VPN?A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
 
- 
                Tip
                15 Apr 2025
                  How to ensure OT secure remote access and prevent attacksOT systems face threats from attackers targeting their remote access capabilities. Segmenting networks is one important step. Learn other ways to safeguard your OT systems. Continue Reading 
- 
                Tip
                04 Apr 2025
                  IPsec vs. SSL VPNs: What are the differences?New technologies get all the headlines, but VPNs aren't going away anytime soon. Speed and security are among the factors to consider when determining what type of VPN to use. Continue Reading By- John Burke, Nemertes Research
 
- 
                Opinion
                03 Apr 2025
                  Palo Alto Networks pushes platformization, AI for securityAt Ignite in New York, the vendor laid out plans to use AI and platformization to consolidate cybersecurity tools and data to combat increasingly sophisticated attacks. Continue Reading By- John Grady, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                Definition
                02 Apr 2025
                  What is a uniform resource identifier (URI)?A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet. Continue Reading By- Rahul Awati
- Fred Churchville, TechTarget
 
- 
                Tip
                31 Mar 2025
                  How to prevent a data breach: 11 best practices and tacticsWhen it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices. Continue Reading By- Andrew Froehlich, West Gate Networks
 
- 
                Definition
                26 Mar 2025
                  What is a web application firewall (WAF)? WAF explainedA web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
 
- 
                Definition
                21 Mar 2025
                  What is network topology?A network topology is the physical and logical arrangement of nodes and connections in a network. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Tom Nolle, Andover Intel
 
- 
                Tip
                17 Mar 2025
                  How to avoid and prevent social engineering attacksOrganizations and employees must both do their part to prevent and avoid social engineering attacks. A combination of security controls, policies, procedures and training is necessary. Continue Reading By
- 
                Tip
                07 Mar 2025
                  Top 14 open source penetration testing toolsFrom Aircrack-ng to ZAP, these open source penetration testing tools are essential additions to any security pro's toolbox. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Definition
                06 Mar 2025
                  What is promiscuous mode in networking?In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host. Continue Reading By
- 
                Tip
                04 Mar 2025
                  Types of DNS servers and how they work, plus security threatsDNS security is a critical component of system administration. Learn about five types of DNS servers, what each does and the security threats each server faces. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Definition
                28 Feb 2025
                  What is FCAPS (fault, configuration, accounting, performance and security)?FCAPS (fault, configuration, accounting, performance and security) is a network management framework and model created by the International Organization for Standardization (ISO). Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Andrew Zola
 
- 
                News
                27 Feb 2025
                  FBI: Lazarus Group behind $1.5 billion Bybit heistResearchers say the heist, in which North Korean state-sponsored hackers stole funds from a cold wallet, is the biggest theft in the history of the cryptocurrency industry. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                27 Feb 2025
                  What is a DMZ in networking?In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet. DMZs are also known as perimeter networks or screened subnetworks. Continue Reading By- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
 
- 
                News
                27 Feb 2025
                  CrowdStrike: China hacking has reached 'inflection point'In its 2025 Global Threat Report, CrowdStrike observed an increase in China's cyber capabilities, with a focus on espionage and 'pre-positioning' itself in critical environments. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                27 Feb 2025
                  What is federated identity management (FIM)? How does it work?Federated identity management (FIM) is an arrangement between multiple enterprises or domains that enables their users to use the same identification data (digital identity) to access all their networks. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Rahul Awati
- Linda Rosencrance
 
- 
                News
                26 Feb 2025
                  NCC Group tracks alarming ransomware surge in JanuaryNCC Group found ransomware activity in January surpassed previous monthly highs with 590 attacks, as one notorious gang experienced a notable resurgence. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                25 Feb 2025
                  Dragos: Ransomware attacks against industrial orgs up 87%Ransomware attacks continue to be a major pain point for industrial organizations, as the sector has historically struggled with vulnerability management. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                21 Feb 2025
                  Palo Alto Networks vulnerabilities exploited in chained attackThe cybersecurity vendor urges customers to take immediate action to mitigate recently disclosed vulnerabilities that are being actively exploited in the wild. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                20 Feb 2025
                  What is TLS (Transport Layer Security)? Definition & UsesTransport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications. Continue Reading By- Scott Robinson, New Era Technology
- Andrew Froehlich, West Gate Networks
- Kevin Beaver, Principle Logic, LLC
 
- 
                Tip
                20 Feb 2025
                  Penetration testing vs. vulnerability scanning: What's the difference?Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each. Continue Reading By- Kyle Johnson, Technology Editor
- Andrew Froehlich, West Gate Networks
 
- 
                Definition
                19 Feb 2025
                  What is an attack vector?An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server to deliver a payload or malicious outcome. Continue Reading By- Scott Robinson, New Era Technology
- Mary E. Shacklett, Transworld Data
 
- 
                News
                18 Feb 2025
                  Palo Alto Networks PAN-OS vulnerability exploited in the wildPalo Alto Networks says threat actors used a publicly available PoC exploit in attack attempts against firewall customers with PAN-OS management interfaces exposed to the internet. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                18 Feb 2025
                  What is the Nessus vulnerability scanning platform?Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Continue Reading By
- 
                News
                13 Feb 2025
                  Salt Typhoon compromises telecom providers' Cisco devicesSalt Typhoon's latest campaign exploits older vulnerabilities in Cisco edge devices to gain access to the networks of several telecom companies, including two based in the U.S. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                13 Feb 2025
                  What is a denial-of-service attack?A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other IT resources. Continue Reading By- Scott Robinson, New Era Technology
- Kevin Ferguson
- Peter Loshin, Former Senior Technology Editor
 
- 
                Definition
                12 Feb 2025
                  What is cyber hijacking?Cyber hijacking, or computer hijacking, is a type of network security attack in which the threat actor takes control of computer systems, software programs and network communications. Continue Reading By- Scott Robinson, New Era Technology
 
- 
                Definition
                11 Feb 2025
                  What is a honeypot? How it protects against cyberattacksA honeypot is a network-attached system set up as a decoy to lure cyberattackers and to help organizations detect, deflect and study hacking attempts to gain unauthorized access to IT. Continue Reading By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
- Casey Clark, TechTarget
 
- 
                Tutorial
                11 Feb 2025
                  How to use pfSense: Use cases and initial configurationsOpen source firewall and routing software pfSense offers a compelling mix of capabilities that can work for organizations large and small. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Definition
                11 Feb 2025
                  What is the RSA algorithm?The RSA algorithm (Rivest-Shamir-Adleman) is a public key cryptosystem that uses a pair of keys for securing digital communication and transactions over insecure networks, such as the internet. Continue Reading By- Kinza Yasar, Technical Writer
- Michael Cobb
 
- 
                Definition
                10 Feb 2025
                  What is ISO 27001?ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard jointly created by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). Continue Reading 
- 
                News
                07 Feb 2025
                  Ransomware hits healthcare, critical services in JanuaryRansomware attacks against healthcare organizations in January reflect an increasing need for threat actors to adapt and get aggressive as defenders improve. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                05 Feb 2025
                  Zyxel won't patch end-of-life routers against zero-day attacksNetworking hardware vendor Zyxel has no plans to patch multiple end-of-life routers against new zero-day flaws and advises customers to replace affected devices entirely. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                05 Feb 2025
                  Chainalysis records 35% decrease in ransom payments in 2024While the first half of 2024 was on pace to surpass 2023's record-setting numbers, Chainalysis found that the volume of ransom payments dropped in the second half of the year. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                04 Feb 2025
                  WatchTowr warns abandoned S3 buckets pose supply chain riskWatchTowr researchers found that they could reregister abandoned Amazon S3 buckets and detail alarming ways that threat actors could exploit the attack surface. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                03 Feb 2025
                  NSFocus: DeepSeek AI hit with 'well planned' DDoS attacksCybersecurity vendor NSFocus said AI startup DeepSeek endured multiple waves of DDoS attacks from attackers since its reasoning model was released Jan. 20. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                24 Jan 2025
                  DOJ indicts 5 individuals in North Korea IT worker scamAn unsealed indictment revealed threat actors working for North Korea tricked at least 64 U.S. businesses into hiring fake IT workers for financial and propriety data gains. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                23 Jan 2025
                  Zero-day vulnerability in SonicWall SMA series under attackSonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                23 Jan 2025
                  Eclypsium finds security issues in Palo Alto Networks NGFWsEclypsium researchers stressed how essential supply chain security is as threat actors increasingly target and exploit vulnerabilities in firewalls, VPNs and other edge devices. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                21 Jan 2025
                  Threat actors abusing Microsoft Teams in ransomware attacksSophos researchers observed two separate threat campaigns in which attackers used Microsoft Teams to pose as IT support personnel and gain access to victims' systems. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                17 Jan 2025
                  Treasury Department sanctions company tied to Salt TyphoonThe sanctions were in response to significant cyberattacks by Chinese nation-state threat groups against the U.S. government and critical infrastructure in recent months. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                16 Jan 2025
                  Threat actor publishes data of 15K hacked FortiGate firewallsAlthough the threat actor published the alleged stolen Fortinet FortiGate firewall data this week, the data is apparently tied to older zero-day exploitation from 2022. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                16 Jan 2025
                  ESET details UEFI Secure Boot bypass vulnerabilityESET researchers last year discovered an unsigned binary in a third-party UEFI application that could have been abused to bypass the Secure Boot process. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading