The Duqu 2.0 malware tool used in the recent attack on security vendor Kaspersky Lab shows a level of sophistication rarely seen in modern malware.
Organizations funnel a lot of resources into defending against zero-day vulnerabilities, but these are not the only concerns they should pay attention to.
While network-based security solutions provide protection for an enterprise's network, endpoint protection is needed to effectively combat advanced malware
A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
According to Google's Project Zero, an Adobe Reader bug has been around for months, raising questions about how well Adobe addressed this vulnerability.
A malicious hacking crew, possibly based out of South Korea, has been quietly stealing data from high-level hotel guests with the Darkhotel malware.
With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.
Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.
The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.