Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Threatpost

Living Off the Land: How to Defend Against Malicious Use of Legitimate Utilities

Posted on February 1, 2022 by Threatpost

LOLBins help attackers become invisible to security platforms. Uptycs provides a rundown of the most commonly abused native utilities for Windows, Linux and macOS – and advice for protection. Continue reading Living Off the Land: How to Defend Against Malicious Use of Legitimate Utilities→

Posted in Sponsored, Uptycs

Shlayer and Bundlore MacOS Malware Strains – How Uptycs EDR Detection Can Help

Posted on January 28, 2022 by Threatpost

MacOS malware Shlayer and Bundlore may have variations, but the behavior of their attacks have not changed – attacking older macOS versions and poorly-protected websites. Continue reading Shlayer and Bundlore MacOS Malware Strains – How Uptycs EDR Detection Can Help→

Posted in Sponsored, Uptycs, Web Security

How to Secure Your SaaS Stack with a SaaS Security Posture Management Solution

Posted on January 27, 2022 by Threatpost

SaaS Security Posture Management (SSPM) named a must have solution by Gartner. Adaptive Shields SSPM solution allows security teams full visibility and control. Continue reading How to Secure Your SaaS Stack with a SaaS Security Posture Management Solution→

Posted in Sponsored

New York AG Warns 17 Firms of Credential Attacks

Posted on January 12, 2022 by Threatpost

Sponsored: Password security is highlighted in attorney general warning to New York state businesses. Continue reading New York AG Warns 17 Firms of Credential Attacks→

Posted in Sponsored

Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast

Posted on November 23, 2021 by Threatpost

That’s just the start of what cyberattackers will zero in on as they pick up APT techniques to hurl more destructive ransomware & supply-chain attacks, says Fortinet’s Derek Manky.
Continue reading Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast→

Posted in Podcasts, Sponsored, vulnerabilities, Web Security

How to Choose the Right DDoS Protection Solution

Posted on November 18, 2021 by Threatpost

Pankaj Gupta, Senior Director at Citrix, outlines how distributed denial of service attacks have become increasingly sophisticated, bigger and economically motivated. Continue reading How to Choose the Right DDoS Protection Solution→

Posted in cloud security, News, Sponsored, Web Security

The New Frontier of Enterprise Risk: Nth Parties

Posted on November 9, 2021 by Threatpost

The average number of vulnerabilities discovered in a Cyberpion scan of external Fortune 500 networks (such as cloud systems) was 296, many critical (with the top of the scale weighing in at a staggering 7,500). Continue reading The New Frontier of Enterprise Risk: Nth Parties→

Posted in cloud security, Sponsored, Web Security

Why the Next-Generation of Application Security Is Needed

Posted on October 26, 2021 by Threatpost

New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security is here. Continue reading Why the Next-Generation of Application Security Is Needed→

Posted in Sponsored, vulnerabilities

Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once

Posted on October 14, 2021 by Threatpost

Fortinet’s Derek Manky discusses a recent global survey showing that two-thirds of organizations suffered at least one ransomware attack, while half were hit multiple times. Continue reading Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once→

Posted in malware, Podcasts, Sponsored

DDoS Attacks: A Flourishing Business for Cybercrooks – Podcast

Posted on September 16, 2021 by Threatpost

Imperva’s Peter Klimek on how DDoS attacks started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,
Continue reading DDoS Attacks: A Flourishing Business for Cybercrooks – Podcast→

Posted in Podcasts, Sponsored, Web Security

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Microsoft Exchange Server Vulnerability Actively Exploited, in a Bad Week for Microsoft May 17, 2026
  • NFC Record Player Promotes Intentional Listening May 17, 2026
  • ‘We Still Can’t See Dark Matter. But What If We Can Hear It?’ May 17, 2026
  • ASUS Zenbook A16 First Impressions May 17, 2026
  • US Math/Reading Scores Continue 13-Year Decline. Researchers Blame Reduced Testing and Social Media May 17, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up