Many enterprises are embracing Open source software (OSS) at a fast pace, but do such software solutions match up against enterprises' internal applications when it comes to security, robustness, maintainability, and efficiency?
71 percent of hackers say they can breach the perimeter of a target within 10 hours" and 100 percent within 15 according to the latest 'Black Report' from Nuix, surveying hacker method and motivation.
One of the vulnerabilities that hackers have recently taken advantage of is insecure deserialisation. While insecure deserialisation is not the only method hackers use to install crypto mining malware, its use has significantly increased.
Microsoft has just patched a vulnerability in the primary tool the company uses to help provide remote assistance to its users, but until all devices are updated there is still some danger.
Advanced Micro Devices (AMD) will release firmware patches and a BIOS update to fix the chipset vulnerabilities exposed by researchers earlier this month but the firm says the flaws aren't as severe as they've been portrayed.
A 15-year-old security researcher discovered a serious flaw in Ledger cryptocurrency wallets that would allow an attacker to siphon the device's private key and drain a user's cryptocurrency account(s).
Microsoft has kicked off a bug bounty programme that could bring in between US$ 25,000 and US$ 250,000 (£17,800 to £178,000) to anyone able to find vulnerabilities similar to the now infamous Spectre and Meltdown.
Security researchers have warned that SAP CRM software has a couple of vulnerabilities that could be combined to compromise user data - the flaw is about as "bad as it gets".
If you can't dedicate the time to meet your free tool halfway, then it may be best to look to an alternative solution.
A vulnerability in the Windows 10 voice assistant, Cortana, allows attackers to open malicious websites on a user's device even when a PC is locked.
As a security topic in its own right, API security and API vulnerabilities are still relatively unknown to most organisations and even many security professionals.
Security researchers report discovering several vulnerabilities and security lapses in Kaspersky Lab's my.kaspersky.com web portal, saying the flaws exposed users to potential session hijackings and account takeovers.
Cisco Systems on Wednesday issued 20 security updates, notably patching a critical vulnerability in two router products that could resulted in remote code execution or a denial of service condition.
The issue with manual patching it that it is very time consuming and vulnerabilities can be missed due to human error. Organisations can combat these issues by delegating the task to technology.
Vulnerabilities in the group communication protocols of three encrypted messaging apps - WhatsApp, Signal, and Threema - could allow attackers to willfully subvert their integrity and confidentiality.
The latest research suggests, within just two years, the security situation for SCADA has got worse to the tune of an average increase of 1.6 vulnerabilities per application tested.
Microsoft has said it will continue to support and not remove DDE as an Office document feature despite its acting as a highly effective exploit method for cyber-criminals.
Almost all iPhones and Macs are at risk from Spectre chip security flaw according to industry reports.
API vulnerabilities are the sleeping giant of our technology-led world. The threats posed by an exposed API are significant, yet, they remain the most overlooked threat to information security today says Jason Macy
VMware on Tuesday patched a series of vulnerabilities in its ESXI, Workstation Pro, and Fusion hypervisors, as well as its vCenter Server Appliance.
A cloud-based data repository belonging to Alteryx, has publicly exposed datasets from the data analytics firm's partner Experian and the US Census Bureau containing sensitive personal information on 123 million Americans.
Hiring a white hat hacker to find your system vulnerabilities and fix them, before the bad guys find and exploit them is a recommended method of strengthening defences says Krishna Rungta.
A recent survey showed that surprisingly, a large percentage of retailers still have no data breach response plan in place.
New Doppelganging attack process memory attack methodology not only defeats market-leading security products but breathes new life into old threats at the same time.
Vulnerability could enable hackers to carry out MitM attacks on bank apps - 10 million users at risk
A collection of vulnerabilities dubbed Mailsploit, found by German security researcher Sabri Haddouche in 30 types of email client applications - from Apple Mail to Mozilla Thunderbird - lets hackers bypass anti-spoofing mechanisms.
Researchers with ClearSky Cyber Security believe with medium-level confidence that they've linked three individuals to the Iranian advanced persistent threat group Charming Kitten, including the man accused of hacking HBO.
Bindecy security researchers identified a flaw in the original patch code of the Dirty Cow vulnerability which could ultimately lead to a privilege escalation attack.
Cisco released patches for multiple vulnerabilities in its WebEx Recording Format and Advanced Recoding Format Players to address vulnerabilities.
Firefox is testing out a warning system that will notify users when they visit breached sites and offer the option to be notified if a site they previously visited becomes breached in the future.