It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
Cybercriminals were reportedly going on a server hacking spree weeks after vBulletin patched a major vulnerability in its popular online forum software.
In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.
No, this is not the start of a sci-fi story; it is the reality that enterprise IT security defenders face in 2014.
Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.
Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.