Open source security tools have come a long way and can be as effective as propriety tools. However, there can be disadvantages to using just open source tools, so a mixed model may be the best route to go.
The vulnerability has been fixed with an upgrade, but unpatched systems risk the deletion of databases and virtual machines, or even having an attacker gain admin privileges.
An advanced cyberespionage group is designing malware that can “jump” across air gaps, researchers say.
A study of major open source projects finds that 3.3% of vulnerabilities are exploited, but the rate of exploitation varies significantly.
Alert overload is taking its toll on security pros. Security experts weigh in on ways to reduce security alert fatigue.