Microsoft combines the attack protection, detection and response features built into Windows 10, Office 365, Azure and the Microsoft Enterprise Mobility Suite to help enterprises improve their operational security posture.
Thousands of mobile applications use cloud-based, back-end services in an insecure way, allowing anyone to access millions of sensitive records created by users, according to a recent study.
Security researchers from FireEye have discovered an attack campaign that has injected computer profiling and tracking scripts into over 100 websites visited by business executives, diplomats, government officials and academic researchers.
A researcher disclosed a trivial Windows authentication bypass that puts data on BitLocker-encrypted laptops at risk.
Some of the most popular continuous integration tools used by software development teams have not been designed with security in mind and can open a door for attackers to compromise enterprise networks.
Two researchers demonstrated attacks against self-encrypting drives used in enterprise environments at the Black Hat Europe conference in Amsterdam.
A serious vulnerability in a popular Java library puts thousands of Java applications and servers at risk of remote code execution attacks.
Malware researchers from Bitdefender created a tool to recover files encrypted with a ransomware program called Linux.Encoder.1.
A cyberespionage group with possible ties to the Iranian government has targeted over 1,600 defense officials, diplomats, researchers, human rights activists, journalists and other high-profile individuals around the world.
After targeting consumer and then business computers, ransomware authors are now going after Web servers.
The U.S. National Institute of Standards and Technology (NIST) has published a guide to application whitelisting that explains the technology in detail and offers practical advice for how it should be used.
In addition to encrypting people's private files a new ransomware program dubbed Chimera threatens to publish those files on the Internet.
Researchers from mobile security firm Lookout have found over 20,000 samples of trojanized apps that root devices.
VBulletin Solutions has reset the passwords for over 340,000 accounts on its website following a security breach and released emergency security patches for its popular Internet forum software that's used on tens of thousands of websites.
Google's security researchers found 11 serious vulnerabilities in Samsung's Galaxy S6 Edge phone in code that was added by the manufacturer.