An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
Using a simple online search engine, a researcher exposed several shipping industry security gaps that could leave container ships vulnerable to threats.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
Security researchers reported that threat actors have been targeting vulnerable servers to mine for cryptocurrency since about May 2017.
Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.