A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
According to Google's Project Zero, an Adobe Reader bug has been around for months, raising questions about how well Adobe addressed this vulnerability.
A malicious hacking crew, possibly based out of South Korea, has been quietly stealing data from high-level hotel guests with the Darkhotel malware.
With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.
Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.
The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
Today's rapidly evolving threat landscape requires advanced, intelligent endpoint protection to prevent APTs and zero-day attacks. Here are three must-have requirements that every organization needs in their endpoint security solution to protect...