Preview Mode
Documentation

The ripple effect of compromised credentials

44% of employees use the same credentials for personal and work accounts, increasing risk to the enterprise

Featured Content

Risk grows as multi-vector becomes norm

Attackers targeting two (or more) vectors at a time - have dramatically improved their chances of successful entry

Read (5 min)

APIs: Business benefits & risks

92% of organizations faced an API attack in the last year — resulting in $12 billion in losses

Watch (56 min)

Internet shutdowns in Iraq and Algeria

Nationwide Internet shutdowns intended to prevent cheating on academic exams results in millions of USD$ lost

Read (6 min)
Everything you might have missed during Security Week 2023

The good, the bad, and the ugly

State of the Internet and the security challenges that businesses face today

Watch (24 min)

Receive a monthly recap of the most popular Internet insights!

Protecting 2,200+ at-risk domains

Shedding light on the challenges at-risk public interest groups face from malicious actors looking to silence them

Read (11 min)

Internet disruptions in Pakistan

How the arrest of former Prime Minister; Imran Khan impacted the country & its Internet use

Read (7 min)

Overcoming down market constraints

Building easy-to-integrate & financially viable products for SMB can become an asset when selling to enterprise

Listen (24 min)

The state of DDoS: New year, new threats

Large-scale volumetric attacks continue to grow as hacktivist target web hosting & cloud computing

Watch (35 min)

Current state of application attacks

Profiling a year of attacks targeting the applications that run business

Watch (48 min)

The CISO's guide to API security

Balancing API security without slowing down innovation

Read the Ebook

'23 Q1 DDoS threat report

DDoS grew 60% YoY with non-profit and broadcast media as prime targets

Explore the Research

Current state of application attacks

Profiling a year of attacks targeting the applications that run business

Watch (48 min)

Trends: Easter and Ramadan

In many countries, this holiday week saw the least Internet traffic of 2023

Read (16 min)

Q1 disruptions to the Internet

The impact of government-directed shutdowns, cyber attacks, and natural disasters

Read (13 min)

API growth parallels attacks

API attacks have reached an all-time high with 53% of data breaches attributed to compromised API tokens

Read (5 min)

Known hacktivists threaten more attacks

Killnet and AnonymousSudan credited for attacks against Western interests with threats to expand

Read (4 min)

Cyber attacks breach MFA

Attackers uncovering new ways to exploit even the most advanced security measures like MFA

Watch (15 min)
Opportunistic phishing/ SVB

Preying on Silicon Valley Bank

The FDIC is guaranteeing that SVB customers’ money is safe while bad actors are attempting to steal it

Read (6 min)

50 most impersonated brands

Okta, Microsoft, and Amazon are among the top brands used in phishing campaigns

Read (6 min)

Killnet cyber attacks on healthcare

As healthcare becomes more reliant on the Internet, the stakes for protecting patient data have increased

Read (4 min)

Attacks up 49% on Holocaust EDU

In honor of Remembrance Day, a deep dive into this and other nonprofits as the 6th most targeted industry

Read (4 min)

Securing Microsoft 365

70% of the enterprise uses M365 making it one of the largest attack surfaces

Read (8 min)

The anatomy of Vendor Email Compromise

Slow play attacks with bigger payouts are emerging as adversaries get more sophisticated

Read (6 min)

NCR: Securing online banking

Ensuring customer success means combatting fraud and attacks as more transactions move online

Watch (2 min)

Attack surface grows with API proliferation

The rapid growth of APIs has led to significant security risks for the enterprise

Read (6 min)

The risks of security monitoring fatigue

4 recommendations to reduce data overload and burnout

Read (6 min)

Security for the holidays

Prepare for the attacks with the greatest risk to your organization

Read (6 min)

Ransomware attackers escalating extortion

7 trends raising the stakes and intensifying negotiations

Read (6 min)

BEC loss is rising

Highly targeted, difficult-to-detect phishing attacks are behind recent headlines

Read (6 min)

Bypassing MFA: The latest exploit

5 ways a Zero Trust strategy can help prevent MFA exploitation and protect user data

Read (5 min)

Using DDoS threats to extort organizations

Attackers proving willing to carry out ransom threats using network DDoS

Read (5 min)

Internal threats reach annual $600K cost

Remote work makes malicious insider attacks difficult to detect

Read (6 min)

The growing cost of shadow IT

80% of employees adopt unsanctioned SaaS applications -- exposing the corporate network

Read (6 min)

The risks smaller DDoS attacks pose

Attack techniques are evolving away from large-scale attacks to focus on smaller, shorter DDoS campaigns

Read (9 min)