It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.
Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.
To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.
Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.
IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities.
The Cisco ASA IKE buffer overflow is a critical vulnerability and requires a proactive response. Let's look at possible Cisco ASA remediation actions.
Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.
A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.