Microsoft has fixed over 40 vulnerabilities in its products Tuesday, including critical ones in Windows, Internet Explorer, Edge, and Office.
Adobe Systems is working on a patch for a Flash Player vulnerability that's currently being exploited in targeted attacks.
Behavior analytics vendor Exabeam applies machine learning to detect ransomware infections and help companies quickly isolate affected computers before the malware spreads.
Many companies protect their brands by registering domain names that are very similar to their own, but manufacturers of industrial control systems don't seem to follow suit, potentially leaving customers open to malicious attacks.
Many organizations that run industrial control systems, whether they're manufacturers or public utilities, strive to isolate them from the Internet, but sometimes forget to disallow Domain Name System (DNS) traffic, which provides a stealthy way for malware to exfiltrate data.
There were 19 distributed denial-of-service (DDoS) attacks that exceeded 100 Gbps during the first three months of the year, four times more than in the previous quarter.
Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've already been cleaned by antivirus products.
Hackers have launched large-scale attacks that are capable of bypassing the security protections added by Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a tool whose goal is to stop software exploits.
Over the weekend hackers have managed to gain access to Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities.
The June batch of Android security patches address nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers.
Since last week attackers have exploited an unpatched vulnerability in a WordPress plug-in called WP Mobile Detector that was installed on over 10,000 websites.
Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes.
Hackers use high-profile data breaches as opportunity to extort money from victims by threatening to release personal and sensitive data about them.
PC maker Lenovo is recommending users remove an application preloaded on their computers because it contains a high-severity flaw that could allow attackers to take over their systems.