Recent variants of Sodinokibi accounted for scaling issues as the ransomware family steadily moves to target large enterprises.
What's the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.
When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?
The first quarter of 2018 saw a rise in cybersecurity threats such as ransomware, Internet of Things (IoT) vulnerabilities and zero-day threats.
With the new Am I Affected button, IBM QRadar users are quickly notified of any indicators of a zero-day vulnerability captured within X-Force Exchange collections.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.
Chrysaor, a variant of Pegasus spyware, has appeared on a small handful of Android devices and surveils users with a variety of techniques.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.