Laden...
The day's top cybersecurity news and in-depth coverage
November 11, 2020
Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks. Read more â¶
Email attackers are increasingly disguising as trusted collaboration tools like Teams and Zoom to deploy malware or steal credentials. One such attack was recently detected and stopped by AI, which revealed the true source of the email.
Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.
A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victimâs computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.
Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.
Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
Check out these free, standout software tools that will make your daily security work easier.
© 2025