An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
Security researchers believe a supply chain attack known as "Operation ShadowHammer" may have distributed a backdoor to more than 1 million users.
Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale.
Researchers Report Nearly 20,000 Vulnerabilities in 2017, Reinforcing the Need for a Proactive Cybersecurity Strategy
A recent study revealed that the number of software vulnerabilities soared to almost 20,000 in 2017, suggesting an urgent need for organizations to adopt a proactive cybersecurity strategy.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
Cybercriminals were reportedly going on a server hacking spree weeks after vBulletin patched a major vulnerability in its popular online forum software.
In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.
Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.
Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.