Security News

Organizations running Apache web servers are urged to implement the latest security update to fix a serious privilege escalation flaw (CVE-2019-0211) that can be triggered via scripts and could...

Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard process of 3rd party threat assessment as practiced today is...

Cynet unveiled the Cynet Threat Assessment program. The free offering for organizations with 500 or more endpoints identifies critically exposed attack surfaces and provides actionable knowledge...

Multi-factor authentication is a common strategy, while Zero Trust is gaining traction, according to an Okta report.

Devs strip code from toolkit amid blogger dramarama A British web-dev outfit has denied allegations it deliberately hid code inside its WordPress plugins that, among other things, spammed a...

In this Help Net Security podcast recorded at RSA Conference 2019, Nicholas Hayden, Senior Director of Threat Intelligence at Anomali, talks about how Anomali arms security teams with highly...

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and production downtime in the...

Multi-stage attacks use diverse and distributed methods to circumvent existing defenses and evade detection - spanning endpoints, networks, email and other vectors in an attempt to land and...

Vishak Raman of Cisco on Coping With the Expanding Attack SurfaceThe advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result,...

Employee mistakes were ranked as the highest risk in the 2019 Global Encryption Trends Study, though employee-owned devices on company networks deserve more security scrutiny.