Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.
IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.
Router security fears have prompted a researcher to recommend that members of the general should disconnect their D-Link 850L routers from the internet.
A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.