2018 Winter Olympic Games hit with destroyer malware during opening ceremony.
Learn best practices about how to avoid API Vulnerabilities from security experts at WhiteHat Security.
There's another 'worldwide' attack known as Petya Ransomware and it's spreading quickly - learn about it first from WhiteHat Security.
A large scale cyber attack of hospitals across England has staff and patients reeling. The fallout has serious impacts on individuals’ healthcare, as everything from patient records and prescriptions to surgery schedules are inaccessible.
This week, it was reported that certain versions of the Apache Struts 2 Framework are vulnerable to Remote Code Execution attacks.
With the migration towards digital transformation and the onslaught of cyber attacks, we need a “Security Facts” label so that we as consumers may make more informed decisions about the risk we are inheriting from the use or acquisition of applications.
I’m here to give you reason to properly fear certain kinds of memes and surveys and social media games, because they are major security risks to you and yours. Let me explain.
We’re pleased to announce a refresh of our Vulnerability Management overview tab.
Application Security is, in many ways, something your banks, your hospitals, your games, and all your online eCommerce and transaction people try to take care of for you. But no one is perfect. No company has all the right answers.