Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

The Importance of Multi-Factor Authentication and Strong Passwords

Understanding and implementing MFA and strong password protocol. By Jeff Severino, CyberLock Defense, Lockton Affinity The importance of multi-factor authentication and password security is critical. Often, it is your best…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on The Importance of Multi-Factor Authentication and Strong Passwords

Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G

By Amr Alashaal, Regional Vice President – Middle East at A10 Networks Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons,…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X