Some of the most popular continuous integration tools used by software development teams have not been designed with security in mind and can open a door for attackers to compromise enterprise networks.
Two researchers demonstrated attacks against self-encrypting drives used in enterprise environments at the Black Hat Europe conference in Amsterdam.
A serious vulnerability in a popular Java library puts thousands of Java applications and servers at risk of remote code execution attacks.
Malware researchers from Bitdefender created a tool to recover files encrypted with a ransomware program called Linux.Encoder.1.
A cyberespionage group with possible ties to the Iranian government has targeted over 1,600 defense officials, diplomats, researchers, human rights activists, journalists and other high-profile individuals around the world.
After targeting consumer and then business computers, ransomware authors are now going after Web servers.
The U.S. National Institute of Standards and Technology (NIST) has published a guide to application whitelisting that explains the technology in detail and offers practical advice for how it should be used.
In addition to encrypting people's private files a new ransomware program dubbed Chimera threatens to publish those files on the Internet.
Researchers from mobile security firm Lookout have found over 20,000 samples of trojanized apps that root devices.
VBulletin Solutions has reset the passwords for over 340,000 accounts on its website following a security breach and released emergency security patches for its popular Internet forum software that's used on tens of thousands of websites.
Google's security researchers found 11 serious vulnerabilities in Samsung's Galaxy S6 Edge phone in code that was added by the manufacturer.
New security patches for Google's Nexus devices address seven vulnerabilities, two of which are critical and could allow for remote code execution when processing media files.
A software development kit created by Chinese Internet services company Baidu and used by thousands of Android applications contains a feature that gives attackers backdoor-like access to users' devices.
Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor, two related ransomware threats.
The Xen Project fixed several vulnerabilities in its popular virtualization software, including one that could allow potential attackers to break out of a virtual machine and gain control over the host system.