The vulnerability gives hackers a means to access sensitive data, move laterally in a network, or execute a ransomware attack.
Attackers were quick to exploit recently announced vulnerabilities to deploy cryptominers. Patch Salt now.
IT admins can now use the G Suite console to secure G Suite accounts on Windows 10 using Google's anti-hijacking and suspicious-login-detection technologies.
Microsegmentation promises to thwart network attackers by curbing their movements and limiting access to enterprise resources. Architecture types include host-agent segmentation, hypervisor segmentation and network segmentation.
Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety.
Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible.
Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.
Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow and other vulnerabilities
The new blockchain protocol, Devv, was demoed at CES; backers say it outperforms other distributed ledger technologies and traditional financial networks such as VisaNet. Analysts are skeptical.
More secure keys protecting the directory name system (DNS) are ready to deploy, but for those using DNS servers that haven't been upgraded, it could cause problems reaching Web sites.
Cisco said that Integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers to quickly secure users to any application on any networked device.
Google has fleshed out its plans to upend the way browsers warn users of insecure websites, spelling out gradual steps the company will take with Chrome.
The company has released an add-on for Chrome – dubbed 'Windows Defender Browser Protection' – that effectively gives up a major asset in its own Edge browser.
IBM researchers have created computers the size of a grain of rock salt that could someday be embedded in every product shipped and used to track it and maintain its authenticity.
With the customer impact of impending new legislation unclear in Australia, security-focused partners are assessing ways to capitalise.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
The biggest security hacks, leaks, and breaches of 2017 may impact your privacy for years to come.
Here's what will happen to Flash Player on Chrome, Edge, Firefox, Internet Explorer and Safari between now and the end of 2020.
When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.
Microsoft today followed May's unprecedented release of security updates for expired operating systems by issuing another dozen patches for the aged Windows XP.
For any enterprise, migrating some or all of its IT Infrastructure to AWS can be very rewarding, bringing levels of functionality, flexibility, cost reduction and innovation well beyond what they can achieve with on-premises IT.. Read more