A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
Traditional vulnerability assessments don't always show the full picture of cloud security, compliance and risk. How can enterprises get ahead of the curve?
A new zero-day vulnerability affecting Windows 7 through 10 was recently disclosed on Twitter. Within two days, security researchers spotted it in the wild.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
A series of penetration tests found that every bank is guilty of web application vulnerabilities and insufficient network security measures.
The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.
A recent report revealed that 94 percent of all web applications suffer from high-severity software vulnerabilities, 85 percent of which are exploitable.
Researchers Report Nearly 20,000 Vulnerabilities in 2017, Reinforcing the Need for a Proactive Cybersecurity Strategy
A recent study revealed that the number of software vulnerabilities soared to almost 20,000 in 2017, suggesting an urgent need for organizations to adopt a proactive cybersecurity strategy.