Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
A lot has happened since the surveillance software company Hacking Team got hacked last week. Here's a quick rundown of updates on the zero-day vulnerabilities that was found following the HT data dump.
Windows Server 2003 will soon join Microsoft’s roster of end-of-life systems. Like Windows XP, Server 2003 will no longer receive security updates after July 14, 2015. What are the different security risks and challenges you might face?
A surveillance software company gets breached, exposing files that include an exploit for a zero-day. Several exploit kits have been updated to include the exploit that affects all versions of Adobe Flash player.
Mere months after the very first backdoor access vulnerability for Macs was reported, another one has just been discovered with the same capability that doesn’t need physical access to do its dirty work.
The average organization takes over 30 days to patch operating systems and software, and longer for more complex business applications and systems. This infographic shows how virtual patching solutions can help mitigate threats from vulnerabilities.