It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.
Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.
Many cybercriminals today use social engineering as a means of carrying out attacks. In fact, this method is among the most popular attack types.
No, this is not the start of a sci-fi story; it is the reality that enterprise IT security defenders face in 2014.
Customers are at significant risk due to a recently reported Adobe breach.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.
Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.