vulnerability
![Windows 10 patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101654/windows_10-patch-400x200.jpg)
Microsoft fixes two RCE flaws affecting Windows 10 machines
Microsoft has released fixes for two remote code execution (RCE) vulnerabilities in the Microsoft Windows Codecs Library on Windows 10 machines. The vulnerabilities Both flaws …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
40% of security pros say half of cyberattacks bypass their WAF
There are growing concerns around the number of businesses vulnerable to cyberattacks due to hackers’ ability to bypass their Web Application Firewall (WAF), Neustar reveals. …
A Boxcryptor audit shows no critical weaknesses in the software
More and more companies, self-employed and private customers are using Boxcryptor to protect sensitive data – primarily in the cloud. Boxcryptor ensures that nobody but …
![Palo Alto Networks](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/30122417/palo_alto_networks-logo-400x200.jpg)
Critical flaw opens Palo Alto Networks firewalls and VPN appliances to attack, patch ASAP!
Palo Alto Networks has patched a critical and easily exploitable vulnerability (CVE-2020-2021) affecting PAN-OS, the custom operating system running on its next generation …
![Snyk](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/26130802/snyk-report-400x200.jpg)
New vulnerabilities in open source packages down 20% compared to last year
New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …
![MacBook Pro](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/22132713/macbookpro-400x200.jpg)
Massive complexity endangers enterprise endpoint environments
There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094348/ms_exchange-400x200.jpg)
How attackers target and exploit Microsoft Exchange servers
Microsoft Exchange servers are an ideal target for attackers looking to burrow into enterprise networks, says Microsoft, as “they provide a unique environment that could …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100228/ddos-400x200.jpg)
Duration of application DDoS attacks increasing, some go on for days
There were seven major application DDoS attacks over the previous month — two of which lasted 5-6 days, Imperva reveals. Additionally, the team found that 47% of account …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111038/cloud-400x200.jpg)
Most malware in Q1 2020 was delivered via encrypted HTTPS connections
67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and 72% of encrypted malware was classified as zero day, so would have evaded signature-based …
![Bugcrowd](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/24122516/itmoah-bugcrowd-400x200.jpg)
Study of global hackers and the economics of security research
Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101141/tools2-400x200.jpg)
Fixing all vulnerabilities is unrealistic, you need to zero in on what matters
As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …
![Drupal](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/19123529/drupal-logo-sky-400x200.jpg)
Drupal fixes three vulnerabilities, including one RCE
Drupal’s security team has fixed three vulnerabilities in the popular content management system’s core, one of which (CVE-2020-13663) could be exploited to achieve …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?