The Cisco ASA IKE buffer overflow is a critical vulnerability and requires a proactive response. Let's look at possible Cisco ASA remediation actions.
Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.
Cybercriminals were reportedly going on a server hacking spree weeks after vBulletin patched a major vulnerability in its popular online forum software.
A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.
Adobe recently issued a patch to address a vulnerability in its popular Flash Player. If not fixed, users could be the target of cybercriminals.
The Duqu 2.0 malware tool used in the recent attack on security vendor Kaspersky Lab shows a level of sophistication rarely seen in modern malware.
Organizations funnel a lot of resources into defending against zero-day vulnerabilities, but these are not the only concerns they should pay attention to.
While network-based security solutions provide protection for an enterprise's network, endpoint protection is needed to effectively combat advanced malware
A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
According to Google's Project Zero, an Adobe Reader bug has been around for months, raising questions about how well Adobe addressed this vulnerability.