SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
A patching delay has pushed new Microsoft updates back until March. Is this a belated Valentine's Day gift for cybercriminals?
A zero-day vulnerability can be absolutely catastrophic for an organization. Zero-day exploits remain popular and widely available on Dark Web forums.
The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?
A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
Apple announced an emergency security update for OS X to address three zero-day flaws that allow cybercriminals to take total control of devices.
Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.
Recent security research found that cybercriminals may be taking their zero-day exploits to the open malware market, peddling them to the highest bidder.
To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.