The recent Apache Log4j vulnerability is a particularly pernicious problem for two reasons: It has a very large footprint and remediation could take weeks.
This is the ninth in our series of cybersecurity predictions for 2016. Stay tuned for more through the end of the year. As 2015 comes to a close, it’s time to look …
On March 24, we released the details of a vulnerability impacting millions of Android devices that allows an attacker to modify applications during the installation process. At that time we also released …
Palo Alto Networks researcher Tao Yan is credited with the discovery of three new critical Microsoft vulnerabilities in June‘s bulletin -- CVE-2016-3205, CVE-2016-3206 and CVE-2016-3207 -- affecting VBScript engine versions 5.7 and …
We’re proud to announce that LabyREnth, the Unit 42 Capture the Flag (CTF) challenge, is open to the public and ready to test your malware analysis and reverse engineering skills. You’ll have …