The shipping industry — along with aviation — is particularly vulnerable to cyberattacks due to its use of outdated, insecure network technologies.
Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.
Known vulnerabilities are the weaknesses that are most often exploited, but how can they be managed?
Sometimes, security professionals don't know how to approach a vulnerability assessment, especially when it comes to dealing with results from its automated report. Here's how to get started.
The first quarter of 2018 saw a rise in cybersecurity threats such as ransomware, Internet of Things (IoT) vulnerabilities and zero-day threats.
A recent report found that malicious crypto-miners have supplanted ransomware as the top healthcare cybersecurity threat.
The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.
According to a new report, cybercriminals now prefer to leverage human-centered vulnerabilities rather than launching automated attacks.
A recent report revealed that 94 percent of all web applications suffer from high-severity software vulnerabilities, 85 percent of which are exploitable.
100 Percent of Web Applications Vulnerable to Attack Despite Big Spending on Global Security Services
One-hundred percent of web applications are vulnerable to attack, despite analyst predictions that global security services spending will reach $96 billion in 2018.