As it nears its exit from the EU, the UK faces tough skills, staff, and regulatory challenges when it comes to protecting its critical national infrastructure.
F5 threat intelligence reports attackers are still doing DNS water torture DDoS, DNS reflection DDoS, expired domain takeover, and using DNS requests for covert channels.
F5 Labs' Ray Pompon writes for Help Net Security, demonstrating how even with accepted risks you can still make things worse - or better - for yourself.
Application programming interfaces (APIs) are a growing attack surface, offering predators unprecedented access to large data stores. As serverless, mobile, and online platforms grow, API attacks will surely rise.
As more and more IoT devices pervade corporate environments, it’s imperative that organizations minimize the very real threat these devices pose.
Managing cybersecurity and protecting the business should be a team effort, so don’t let your CISO become the easy scapegoat when things go wrong.
Businesses, critical systems, infrastructure, and even human life are more threatened than ever as attackers target the Internet-connected “things” that run the modern world.
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.