Using a simple online search engine, a researcher exposed several shipping industry security gaps that could leave container ships vulnerable to threats.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
Security researchers reported that threat actors have been targeting vulnerable servers to mine for cryptocurrency since about May 2017.
Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.
IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.
Router security fears have prompted a researcher to recommend that members of the general should disconnect their D-Link 850L routers from the internet.