Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.
IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.
The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
A new cybergang operating a recent variant of the Ursnif Trojan has planted its flag in Australia, targeting banking customers with redirection attacks.