Security researchers observed threat actors using a Delphi packer to shield their binaries from malware classification by antivirus and other detection tools.
A free browser plugin for creating, editing and viewing PDF files contains 18 security vulnerabilities that could expose users to remote code execution.
A recent study from Positive Technologies shined a light on an attack vector that is often overlooked: the insecurity of web applications.
When it comes to cloud data protection, it's not just credit card numbers that need protecting, it's also the data that represents a majority of your company's value: your intellectual property.
Malware authors have released modified versions of the Mirai and Gafgyt IoT malware that are capable of targeting vulnerabilities affecting SonicWall's GMS and Apache Struts.
New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value
Gartner's new report recommends factoring severity, asset value and active exploits into your vulnerability management process.
The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats.
A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
The creators of a ransomware-as-a-service threat dubbed Princess Evolution are looking for affiliates to spread the Rig exploit kit in exchange for 60 percent of what's stolen.
At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.