Patches

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How to protect your server against ransomware attacks?

Many companies get scared and pay up the demanded ransom almost immediately which only leads to criminals getting more emboldened. 

Intel discloses new vulnerability that could affect Core family CPUs

With Meltdown and Spectre variants still on the map, another security vulnerability has emerged that affects Intel processors’ speculative execution technology.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Partner Content
Malware in attachment? Stop them before they hit your organization's security

Malware authors are continuously experimenting and employing new tactics to disguise their malware into email attachment. The key objective is to make the email look “normal” and “non-suspicious”, which will prompt the recipient to open the attachment without any suspicion.

Partner Content
Eternal Blue - A Prominent Threat Actor of 2017 - 2018

This paper outlines the usage of FuzzBunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue Exploit and DoublePulsar payload. In addition to these, this paper also puts together the detection statistics of EternalBlue exploit after its inception in May, in various campaigns till date. 

Users attacked with malicious Office documents grew fourfold: Kaspersky

Attacks based on exploits are considered to be very powerful, as they do not require any additional interactions with the user and can deliver their dangerous code discreetly.

Partner Content
Here's the checklist of an efficient endpoint security solution

Most attacks on an organization can be traced back to devices connected to enterprise networks, which is basically an endpoint. And hence, that is why it is extremely important for an enterprise to ensure that their endpoints remain safe and secure.

Schneider Electric patches vulnerable applications

​A remote code execution vulnerability found in two Schneider Electric applications has been revealed by cyber security vendor Tenable.

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools that's right for you.

10 tips to minimize IoT security vulnerabilities

Online Trust Alliance spells out best practices for testing, purchasing, networking and updating IoT devices to make them and the enterprise more secure.