New Microsoft patches are still dealing with a flaw discovered in November of last year — it was first Evil Maid and is now known as Malicious Butler.
The popularity of threats such as the CryptoLocker ransomware highlights some security best practices that can help enterprises avoid attacks.
A series of old Microsoft vulnerabilities continues to cause problems in Microsoft Office products. Here's what users need to know.
The endpoint protection of the future must be able to identify indicators of compromise, locate vulnerabilities and move to patch them quickly.
A security researcher at Google recently found more than two dozen severe Symantec vulnerabilities affecting several security products.
Users should pay particular attention to recent Patch Tuesday updates, which will fix several critical vulnerabilities in Windows products.
A recent threat report from Symantec found that zero-day vulnerabilities were found about once a week in 2015, representing a big increase from 2014.
The Cisco ASA IKE buffer overflow is a critical vulnerability and requires a proactive response. Let's look at possible Cisco ASA remediation actions.
Is the new glibc getaddrinfo vulnerability really GHOST 2.0? Signs point to yes, so organizations should patch this vulnerability immediately.
A set of three critical security vulnerabilities may be opening the door for cybercriminals to attack enterprises during the holiday weeks.