Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
Security researchers discovered that attackers are using fake copyright infringement notifications as part of a recent Instagram hacking campaign.
Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.
The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.
By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.
To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.
Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.
To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.
A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.