As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.
Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.
On November 22, Intel Corporation confirmed security vulnerabilities relating to Intel Management Engine (ME), Intel Server Platform Service (SPS),...
Microsoft released security patches to deal with a 17-year-old flaw that could be exploited to remotely initiate malicious code on all Windows versions.
There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
A new vulnerability called TorMoil exploits a browser flaw to bypass security relays and expose real IP addresses belonging to Tor users.