What are hackers after

We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That'...

We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That’s the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint’s weakest link. Not only are enterprises generally slow to keep up with browser patching, they’re downright sluggish at updating plug-ins and extensions.

University of Maryland University College is the proud sponsor of WTOP and Federal News Radio’s Cyber Security report. Click here to read more Cyber Reports.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    USCG/Petty Officer 2nd Class Ali FlocSeattle Police Department and Thurston County-Sheriff officers train with the U.S. Coast Guard throughout the waters of Puget Sound. Coast Guard Sector Puget Sound U.S. Coast Guard Pacific Northwest.

    Coast Guard adds new cyber requirements for ship-to-shore cranes

    Read more
    Getty Images/iStockphoto/chombosanAI (artificial intelligence) concept.

    Shining a light on shadow AI: Three ways to keep your enterprise safe

    Read more