What is Cyber Threat Hunting? Definition, Techniques & Steps

Threat hunting starts with a pretty paranoid premise: That your network may have already been breached and threat actors may be inside waiting for an opportunity to strike. Sadly, that turns out to be true in many cases. You can’t be paranoid enough when it comes to cybersecurity. And that’s why cyber threat hunting adds […]

The post What is Cyber Threat Hunting? Definition, Techniques & Steps appeared first on eSecurityPlanet.

February 18, 2023
Read More >>

How hackers can cause physical damage to bridges

In this Help Net Security video, Daniel Dos Santos, Head of Security Research at Forescout, talks about recent research, which has revealed how attackers can move laterally between vulnerable networks and devices found at the controller level of critic…

February 17, 2023
Read More >>

Cloudflare Blocks Record DDoS Attack as Threats Surge

Cloudflare mitigated dozens of hyper-volumetric DDoS attacks last weekend, most of them ranging from 50 to 70 million requests per second (RPS) – and the largest one exceeding 71 million RPS. “This is the largest reported HTTP DDoS attack on record, more than 35 percent higher than the previous reported record of 46 million RPS […]

The post Cloudflare Blocks Record DDoS Attack as Threats Surge appeared first on eSecurityPlanet.

February 16, 2023
Read More >>

Microsoft Patch Tuesday Includes Three Exploited Zero-Day Vulnerabilities

Microsoft’s February 2023 Patch Tuesday fixes 75 vulnerabilities, nine of them rated critical, and three (all rated important) that are being exploited. “This is only the second Patch Tuesday of the year, and we have already tripled the number of weaponized threats that need to be fixed in this release,” Syxsense CEO and founder Ashley […]

The post Microsoft Patch Tuesday Includes Three Exploited Zero-Day Vulnerabilities appeared first on eSecurityPlanet.

February 15, 2023
Read More >>