5 min read - IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.
2 min read - The IBM X-Force team tracked the weaponization of IoT devices and found that the threat of so-called thingbots increased dramatically in 2016.
2 min read - Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.
3 min read - Cisco recently addressed two exploits that sound more like delicious drive-thru menu items than dangerous security risks: EXTRABACON and EPICBANANA.
3 min read - Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?
4 min read - Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.
2 min read - Understanding the motivation behind cyberattacks — and knowing who could be after your organization — can help you reduce your security risk.
3 min read - A look back at data breaches in 2015 and some simple steps that can be the difference between investigating an alert versus investigating a breach.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.