Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid cloud security fit naturally into development processes?
A review of the first half of 2018 shows a threat landscape that not only has constant and familiar features but also has morphing and uncharted facets: Ever-present threats steadily grew while emerging ones used stealth.
Users of the Apache Struts are urged to update to its latest version after security researchers uncovered a critical remote code execution (RCE) vulnerability in the web application development framework.
At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in printers. Here's how managed detection and response can help address similar threats.
Four vulnerabilities, including two critical ones, in Phoenix Contact switches used in industrial systems automation could be exploited for attacks. Affected companies are strongly advised to apply patches immediately.
PyRoMineIoT malware infects systems with a Monero miner, spreads using RCE EternalRomance by removing or modifying accounts and passwords with privileged access, and scans for vulnerable Internet of Things devices for possible future attacks.