A team of researchers exposed gaps in booking systems security at a recent conference in Germany and encouraged GDS providers to upgrade their systems.
Trojan-laden malware remains a huge problem for enterprises and individual users alike. As noted by Palo Alto Networks, some cybercriminals are targeting users with creative Mac OS X malware that uses a PDF detailing Russian space program projects...
The Kerio Control information appliance, usually known as Kerio Firewalls, can be attacked and the internal controls bypassed, according to SEC Consult. The device is designed by Kerio Technologies to be used as a network firewall, router or VPN...
Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
Onapsis discovered multiple new vulnerabilities affecting the SAP HANA and SAP TREX applications, including critical and high-risk security flaws.
Organizations with weak security posture are an attractive target for cybercriminals, and they may find themselves coming under fire frequently.
New security research from Akamai found that brute-force attacks are making a comeback thanks to their low-risk, high-reward nature.
Remote desktop servers are vulnerable to brute-force attacks, and as a result, they may allow ransomware to enter a corporate network.
With so much attention focused on APTs and mutating malware, it's easy to overlook brute-force attacks — which can still be successful.
A cybercriminal claims the iDict tool was only created to force Apple to deal with a vulnerability in iCloud that allowed brute-force attacks.