SQL injection main database security concern among SMBs
GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …
Deconstructing local and remote file inclusion attack vectors
Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and …
Targeted domain controller attacks increase 150%
Bit9 has seen a 150 percent increase in the number of attacks on domain controllers year-over-year. Attackers, largely nation states and cyber criminals, are targeting …
Widespread use of vulnerable open source components
Sonatype and Aspect Security collaborated on a study of the real-world use of vulnerable versions of open source libraries. Used by developers around the world, open source …
Exploiting legitimate online technology
Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …
Plan to reduce botnets launched
More than one in ten U.S. computers are infected by difficult-to-detect bots, which botmasters can use for anything from sending spam, to eavesdropping on network traffic, to …
Data breach vulnerabilities in the workplace
Many business professionals don’t realize that when their company’s confidential information is at risk, so too is the information of its clients, vendors, …
Top cause of data breaches? Negligent insiders
Negligent insiders are the top cause of data breaches while malicious attacks are 25 percent more costly than other types, according to the Ponemon Institute. The study also …
Surge in mobile exploits and shell command injection attacks
IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …
Risk across the phases of application security
A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …
The practice of insecure collaboration
Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
Featured news
Resources
Don't miss
- The AI safety conversation is focused on the wrong layer
- Critical NetScaler ADC, Gateway flaw may soon be exploited (CVE-2026-3055)
- GitHub-hosted malware campaign uses split payload to evade detection
- Measuring security performance in real-time, not once a quarter
- Attackers are handing off access in 22 seconds, Mandiant finds