illustration of hacker on computer with text reading html smuggling

Digital smugglers: How attackers use HTML smuggling techniques to beat traditional security defenses

It’s hard to imagine a time when the web browser wasn’t the critical enterprise productivity app. Many enterprise workers born in the 1990s likely don’t recall when the web browser wasn’t the ...
illustration of web browser with warning symbol

Escalating evasive browser attacks: Understanding the whys

Cybersecurity is a perpetual challenge of strategy and adaptation. Threat actors find a vulnerability, and, eventually, security vendors plug the hole. Attackers find another way into the network, and a patch is ...
AI's role in revolutionizing browser security

Breaking the misconception: Unveiling AI’s impact on browser security

To say artificial intelligence (AI) has been a buzzword in the security industry is a massive understatement. One thing’s for sure, there are often misconceptions surrounding AI’s true potential. In a recent ...
illustration of news anchor discussing HEAT breaking news

Real-world examples of Highly Evasive Adaptive Threats (HEAT) in the news

Despite some good news from the recently released 2023 CyberEdge Cyberthreat Defense Report (CDR), high-profile breaches continue to plague the industry. From Rackspace to Twitter to GitHub, businesses, organizations and government agencies ...
illustration of man looking at laptop in confusion with icon of password protected file

Malicious password-protected files: The issue of prioritizing business decisions over security policies

Attackers are constantly crafting new ways to evade enterprise cybersecurity defenses. Consider both how phishing attacks and the delivery of malware are evolving. In this case, through password-protected files to infect endpoints ...
image of open 2023 cyberthreat defense report

The increasing emphasis on browser security: Insights from the 2023 Cyberthreat Report

The latest findings from the 2023 CyberEdge Cyberthreat Defense Report (CDR) features some positive news about the state of cybersecurity. The industry is making progress and is showing increased confidence in its ...
illustration of hands obfuscating a web browser

The illusion of safety: Unmasking evasive browser attacks for a secure cyber landscape

Security used to be pretty straightforward. Enterprises would build a strong perimeter defense in front of a robust data center and shore up entry points into the network—ensuring that malicious actors couldn’t ...
DarkReading HEAT Interview

The difference between Highly Evasive Adaptive Threats (HEAT) and advanced persistent threats (APT)

In the fast-paced world of enterprise security, the last two years have seen a whirlwind of change unlike any other. The rise of remote work, cloud migration, and Software-as-a-Service (SaaS) applications has ...
Illustration of tired man sitting in front of SOC, servers

Eliminating SOC fatigue in today’s distributed, hybrid workplace

In a word, today’s threat landscape is relentless. According to Check Point Research, cyberattacks reported globally in 2022 increased by 38% compared to 2021—reaching an all-time high in Q4 of 1168 weekly ...
Illustration of people using laptops while surrounded by holes in the ground

Avoid these cybersecurity pitfalls to protect remote workers in 2023

Digital transformation. Exploding threat surfaces. Work from home. Hybrid work. Software as a Service (SaaS). Cloud migrations. Secure Remote Access. Private tunnels. SD-WAN. Ransomware. Phishing. Social engineering. Drive-by attacks. Credential theft. BYOD ...