New & Notable

News

Citrix NetScaler devices targeted in brute force campaign

Citrix advised NetScaler customers to ensure that their devices are fully updated and properly configured to defend against the recent spike in brute force attacks.

News

Microsoft enhanced Recall security, but will it be enough?

Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.

News

Attackers exploit vulnerability in Cleo file transfer software

Cleo disclosed and patched the remote code execution vulnerability in late October, but managed file transfer products have proved to be popular targets for threat actors.

News

Ultralytics YOLO AI model compromised in supply chain attack

While Ultralytics has not released an official security advisory, the company pulled two recent versions of its YOLO11 AI model after reports said they contained a cryptominer.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a block cipher?

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • Get Started

    What is a stream cipher?

    A stream cipher is an encryption method in which data is encrypted one byte at a time.

  • Get Started

    What is a session key?

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security