Infosecurity Blogs
Template Injection Attacks: Protecting Against Camouflaged URLs
Organizations can no longer rely on traditional security tools to protect against advanced threats
The Enemy Has Deep Pockets: How safe are your user accounts?
Understand the latest techniques bot operators are using to bypass traditional detection methods and what to do to avoid falling victim to an attack
How to be Mindful of Security Threats During the FIFA World Cup
How are cyber-attackers likely to target the upcoming FIFA football world cup, and how can these threats be mitigated?
Solving the Cybersecurity Permacrisis
Enterprises that make the time and space for their security staff to learn will achieve much higher levels of security
How Schools Can Become Cyber Resilient in 2023
Threat actors continue to target schools and the data they hold. This article provides advice and tips on how they cany protect themselves from an attack.
Microsoft 365 Apps Continue to be the Most Exploited Cloud Services
As attacks on cloud applications grow, it is essential that businesses gain greater visibility over their cloud infrastructure
Data Protection is the Heart of Zero Trust, Forrester Reports
Fasoo's Ron Arden analyses Forrester's latest report, The Definition of Modern Zero Trust
Protecting Your Business as DDoS Attacks Set to Surge
From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.
ID Authentication Bypass and the Next Evolution in Phishing Campaigns
New insights highlight the sophistication of modern phishing packages available to budding fraudsters
The Increasingly Complex Threat Landscape Must Be Fought With Simplicity
New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack
Interactive Malware Sandbox in Your Security System
Understand how to overcome the issues of traditional antiviruses with an online malware sandbox
Template Injection Attacks: Mitigating Modern Threats
The Menlo Labs Team has recently observed a spike in template injection attacks
An Analysis of Security Vulnerability Trends During COVID-19
What were the security vulnerability trends during COVID-19?
Why Zero Trust and Identity and Access Management are Essential to Enterprise Security
Discover why turning to Zero Trust is important to be able to secure an organization's operations
Combating CNI Security Concerns in a Complex Climate
An attack on critical infrastructure remains an ongoing concern for cybersecurity professionals and there is a need for best practices to be followed
Cross-Functional Collaboration is Becoming Essential for Security Professionals
The threats facing organizations today are too numerous and complex to be dealt with exclusively by the security team
Qakbot: Analysing a Modern-Day Banking Trojan
Attackers are using increasingly innovative methods to launch the Qakbot Trojan
Initial Access Brokers and Blocking the Continued March of Ransomware
IABs have made ransomware attacks easier for affiliate groups and organizations need to respond
Observing the Changing Nature of Security within Organizations
Understand why an organization's security posture must align with business objectives
Fixing Our Breaking Human Controls
Jenai Marinkovic argues that more empathy is required to mitigate cyber-threats