February 20, 2017 Microsoft Patching Delay: A Huge Hacking Valentine? 2 min read - A patching delay has pushed new Microsoft updates back until March. Is this a belated Valentine's Day gift for cybercriminals?
January 30, 2017 Risk Reduction: Zeroing In on the Zero-Day Vulnerability 2 min read - A zero-day vulnerability can be absolutely catastrophic for an organization. Zero-day exploits remain popular and widely available on Dark Web forums.
January 23, 2017 Zero-Day Deals? Shadow Brokers Looking for Windows Exploit Buyer 2 min read - The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?
December 19, 2016 Zero-Day Exploits Affect Desktop Linux 2 min read - A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
September 6, 2016 Apple Chomps on Critical Zero-Days With Emergency Mac Security Update 2 min read - Apple announced an emergency security update for OS X to address three zero-day flaws that allow cybercriminals to take total control of devices.
Network September 6, 2016 It’s the Simple Things: Getting the Basics Right Can Solve Complex Security Issues 2 min read - Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
Application Security June 3, 2016 Inside the Mind of a Hacker: Attacking the Memory 4 min read - A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.
June 2, 2016 New Zero-Day Exploit Hits the Malware Market 2 min read - Recent security research found that cybercriminals may be taking their zero-day exploits to the open malware market, peddling them to the highest bidder.
Application Security May 26, 2016 Inside the Mind of a Hacker: Attacking the Shell 4 min read - To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.
Application Security May 12, 2016 Inside the Mind of a Hacker: Attacking Databases With SQL Injection 4 min read - Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.