Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
An old Windows bug has resurfaced, causing newer systems to crash or display the blue screen of death. Here's what you need to know.
While Microsoft could have slowed the spread of WannaCry, the real problem lies in the widespread practice of deploying outdated software and systems.
The most recent Microsoft update addresses a flaw in the Microsoft Malware Protection Engine that could enable attackers to commit remote code execution.
Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
Legacy systems and platforms can pose serious problems for businesses. Consider the security risks that can come with obsolete technology.
New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.