A quick review of some of the most destructive cyberattacks and data breaches over the past few years show just how much damage unpatched vulnerabilities can inflict on an organization.
An active Microsoft Office and Wordpad spam campaign is targeting European users with files that allow attackers to exploit the CVE-2017-11882 vulnerability.
Trend Micro researchers uncovered a new variant of the notorious Mirai malware that uses multiple exploits to target various routers and internet-of-things devices.
A new Mirai botnet variant is targeting smart signage TV and wireless presentation systems commonly used by businesses. Upgraded with 11 new exploits and default credentials for brute-forcing, enterprises are advised to patch immediately.
We looked back at 2018’s mobile threat landscape to see the possible threats that lie ahead and help users and organizations proactively defend against them.
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
Nasze prognozy związane z bezpieczeństwem na rok 2019 są oparte na analizach ekspertów w zakresie rozwoju bieżących i nowych technologii, zachowania użytkowników oraz trendów na rynku, a także ich wpływu na krajobraz zagrożeń.
Nasze prognozy związane z bezpieczeństwem na rok 2019 są oparte na analizach ekspertów w zakresie rozwoju bieżących i nowych technologii, zachowania użytkowników oraz trendów na rynku, a także ich wpływu na krajobraz zagrożeń.
The average organization takes over 30 days to patch operating systems and software, and longer for more complex business applications and systems. This infographic shows how virtual patching solutions can help mitigate threats from vulnerabilities.