A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
A series of penetration tests found that every bank is guilty of web application vulnerabilities and insufficient network security measures.
The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.
A recent report revealed that 94 percent of all web applications suffer from high-severity software vulnerabilities, 85 percent of which are exploitable.
Researchers Report Nearly 20,000 Vulnerabilities in 2017, Reinforcing the Need for a Proactive Cybersecurity Strategy
A recent study revealed that the number of software vulnerabilities soared to almost 20,000 in 2017, suggesting an urgent need for organizations to adopt a proactive cybersecurity strategy.
As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.