The Hacker News Logo
Subscribe to Newsletter

The Hacker News — Cyber Security and Hacking News Website: network security

WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

May 21, 2019The Hacker News
High-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who...
Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

March 28, 2019The Hacker News
Doing business in today's connected world means dealing with a continually evolving threat landscape. With potential losses due to ...
Cynet is offering unhappy competitors' customers a refund for the time remaining on existing contracts

Cynet is offering unhappy competitors' customers a refund for the time remaining on existing contracts

March 12, 2019The Hacker News
Cynet goes head-to-head with CrowdStrike, DarkTrace, Cylance, Carbon Black & Symantec, offering their unhappy customers a refund for...
Google Launches Backstory — A New Cyber Security Tool for Businesses

Google Launches Backstory — A New Cyber Security Tool for Businesses

March 05, 2019Swati Khandelwal
Google's one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory , a cloud-based ...
Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

February 19, 2019The Hacker News
How do you know whether an attacker has infiltrated your network? Can you really rely on an Endpoint Detection and Response (EDR) solution...
Researchers Release Tool That Finds Vulnerable Robots on the Internet

Researchers Release Tool That Finds Vulnerable Robots on the Internet

January 28, 2019Mohit Kumar
A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily &...
Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security

Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security

January 10, 2019Swati Khandelwal
Almost every activity on the Internet starts with a DNS query, a key function of the Internet that works as an Internet's directory w...
VPNFilter Router Malware Adds 7 New Network Exploitation Modules

VPNFilter Router Malware Adds 7 New Network Exploitation Modules

September 27, 2018Swati Khandelwal
Security researchers have discovered even more dangerous capabilities in VPNFilter —the highly sophisticated multi-stage malware that inf...
Hackers can compromise your network just by sending a Fax

Hackers can compromise your network just by sending a Fax

August 14, 2018Swati Khandelwal
What maximum a remote attacker can do just by having your Fax machine number? Believe it or not, but your fax number is literally enoug...
Critical Unpatched RCE Flaw Disclosed in LG Network Storage Devices

Critical Unpatched RCE Flaw Disclosed in LG Network Storage Devices

April 18, 2018Mohit Kumar
If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this ar...
Here's how hackers are targeting Cisco Network Switches in Russia and Iran

Here's how hackers are targeting Cisco Network Switches in Russia and Iran

April 09, 2018Mohit Kumar
Since last week, a new hacking group, calling itself ' JHT ,' hijacked a significant number of Cisco devices belonging to organi...
Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

April 04, 2018Swati Khandelwal
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow a...
How to Mitigate the Threat Cryptocurrency Mining Poses to Enterprise Security

How to Mitigate the Threat Cryptocurrency Mining Poses to Enterprise Security

February 05, 2018Swati Khandelwal
The growing popularity of Bitcoin and other cryptocurrencies is generating curiosity—and concern—among security specialists. Crypto minin...
Critical Unpatched Flaws Disclosed In Western Digital 'My Cloud' Storage Devices

Critical Unpatched Flaws Disclosed In Western Digital 'My Cloud' Storage Devices

January 05, 2018Swati Khandelwal
Security researchers have discovered several severe vulnerabilities and a secret hard-coded backdoor in Western Digital's My Cloud NA...
Cisco Training Courses | Online CCNA, CCNP Certification Training

Cisco Training Courses | Online CCNA, CCNP Certification Training

November 15, 2017The Hacker News
As governments and enterprises migrate toward controller-based architectures, the role of a core network engineer are evolving and more i...
DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

October 24, 2017Mohit Kumar
DUHK — Don't Use Hard-coded Keys — is a new 'non-trivial' cryptographic implementation vulnerability that could allow attacke...
Incapsula Updated Review — New Security Options, Improved Delivery and Reliability

Incapsula Updated Review — New Security Options, Improved Delivery and Reliability

September 06, 2017Unknown
It's been close to five years since we last looked at Incapsula , a security-focused CDN service known for its DDoS mitigation and w...
IPS as a Service Blocks WannaCry Spread Across the WAN

IPS as a Service Blocks WannaCry Spread Across the WAN

August 14, 2017Mohit Kumar
One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerabili...
Exclusive Deals

Get Daily News Updates By Email

Join over 350,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.