Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
The average organization takes over 30 days to patch operating systems and software, and longer for more complex business applications and systems. This infographic shows how virtual patching solutions can help mitigate threats from vulnerabilities.
Server keys can be exposed due to proxy vulnerabilities in a popular development software program, making them prone to attacks and theft of sensitive information.
Vulnerabilities in the popular open-source management software Git could be abused to trawl contents of a repository memory and execute a code with a malicious hook.
Microsoft is implementing a new process for delivering Windows updates and patches: Registry keys are now required. Here's what users and businesses need to know.
Can we fix the lag between patch releases and actual implementation? Current events reveal that patching should be made a definite priority. We provide a guide on how to manage patching for enterprises and large organizations.
Three zero-day vulnerabilities were exposed after an attempted attack on a high-profile human rights activist’s iPhone. Apple responded quickly by releasing a patch to address the bugs.
A lot has happened since the surveillance software company Hacking Team got hacked last week. Here's a quick rundown of updates on the zero-day vulnerabilities that was found following the HT data dump.
Windows Server 2003 will soon join Microsoft’s roster of end-of-life systems. Like Windows XP, Server 2003 will no longer receive security updates after July 14, 2015. What are the different security risks and challenges you might face?