Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.
These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.
Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Blocking refers to the practice of deploying network security devices to block threats as they traverse the network.
While Microsoft could have slowed the spread of WannaCry, the real problem lies in the widespread practice of deploying outdated software and systems.
Effective defense against large-scale ransomware attacks such as WannaCry starts with basic endpoint protection and patch management.