Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and...
Businesses and government agencies are a popular target for attackers looking to steal information and destroy networks, and they are woefully unprepared to deal...
Mark Dowd, co-founder of Azimuth Security, disclosed details of vulnerabilities he discovered in the ZRTPCPP library last week, which is a core component for...
A technical advisory from Command Five, an Australian security consultancy, has outlined the recently patched flaws in Atlassian’s Crowd Single Sign-on (SSO) software package....
Norwegian browser maker Opera Software has confirmed that a targeted internal network infrastructure attack led to the theft of a code signing certificate that...
Security response personnel at HP are "actively working on a fix" for a potentially dangerous backdoor in older versions of its StoreOnce backup product...
In a survey of CIOs, system administrators, and compliance auditors, SANS Institute found that the awareness of the Critical Security Controls is very high,...
Microsoft's Katie Moussouris joins Ryan Naraine to explain the thinking behind the new bug bounty programs and why it will entice security researchers to...
Adobe's new Chief Security Officer Brad Arkin joins Ryan Naraine to discuss the task of securing the company's assets, the importance of putting roadblocks...
During his talk earlier this month at RSA Conference Asia Pacific 2013, Alexander Polyakov, CTO of ERPScan, disclosed that there are thousands of unpatched...
Craig Heffner, a vulnerability researcher for Tactical Network Solutions in Columbia, MD, is returning to Black Hat this summer with a presentation that will...
Mandiant's M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate...