Lack of Open Source Component Management and Control is Putting Production Applications At RiskA significant portion of software is assembled using open source components...
In this episode of the Security Conversations podcast, Cylance Technical Directors Billy Rios and Terry McCorkle join Ryan Naraine to discuss the state of...
In its Q1 2013 roundup, Trend Micro said that zero-day vulnerabilities, in addition to concentrated attacks that cause high-damage, such as those in South...
Just five days after Oracle released the patches, criminals have added exploits for Java’s recent flaws to their kits. Security firm F-Secure spotted the...
On Thursday, Rapid7 advised users of Apple’s Safari Web browser to avoid opening “.webarchive” files, after the discovery of a vulnerability in the security...
WASHINGTON - US authorities charged with overseeing the financial sector are worried about its vulnerability to cyberattacks, they said in a report published Thursday.
A malicious campaign that started last summer is once again targeting Uyghur activist groups in China. The latest developments in this year-long fight is...
Attackers are exploiting a vulnerability in a popular Website configuration tool to gain remote access to Web servers, Cisco researchers said in an advisory.
A researcher at Rapid7 has discovered that some 114,000 misconfigured serial port servers that connect business IT and industrial control systems to the Internet...