SAP has fixed multiple vulnerabilities in compression libraries used in several SAP products discovered by Core Security researchers. Administrators should check the Support Portal...
Hi, what are you looking for?
SAP has fixed multiple vulnerabilities in compression libraries used in several SAP products discovered by Core Security researchers. Administrators should check the Support Portal...
Attackers typically use one of three common techniques to compromise SAP systems at the application layer: pivoting, portal attacks, and database warehousing, according to...
"Re-Direct to SMB" Vulnerability Allows Attackers to Gain Access to Login Credentials Researchers from security firm Cylance have disclosed a security flaw which impacts...
Linux Foundation to Host Let's Encrypt, Project to Bring Free SSL Certs to Websites
The recent executive order signed by President Obama establishing a sanctions program for overseas cyber-attackers gives the government a new tool to deter malicious...
Companies are getting better at complying with payment card industry security standards, but experts believe that is only half of the story.
IBM researchers discovered a flaw in Dropbox's Android SDK which can leave mobile users vulnerable to attack.
The average large global enterprise has about 2,400 unsafe apps installed on the mobile devices in its environment, according to a new Veracode study.
Web hosting provider DreamHost has issued its first ever transparency report to show off how frequently the company did not comply with government requests.
Health insurance giant Anthem was criticized last week after reports emerged that it had declined a security audit from the Office of Personnel Management's...
While a growing number of financial services organizations are moving their data and applications to the cloud, most of them do not have a...
Despite the focus on exotic zero-day exploits and sophisticated hacking techniques, IT teams are more concerned about more mundane risks to their organizations, such...