SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
A zero-day vulnerability can be absolutely catastrophic for an organization. Zero-day exploits remain popular and widely available on Dark Web forums.
The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?
A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.
Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
Recent security research found that cybercriminals may be taking their zero-day exploits to the open malware market, peddling them to the highest bidder.
A recently discovered Joomla security vulnerability could allow cybercriminals to score some big hits against organizations and their servers.
The content management system Joomla recently patched vulnerabilities that were contributing to zero-day exploits across websites.
A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.