Researchers from Black Duck Software expect the rate of attacks against known vulnerabilities in open source code to increase by 20 percent in 2017.
The IBM X-Force Application Security Research Team discovered an arbitrary write vulnerability in Nexus 9's kernel, putting application data at risk.
The authors of the Sundown exploit kit leveraged research conducted by Texas-based security firm Theori to develop a PoC exploit.
X-Force researchers disclosed several Android vulnerabilities that could enable cybercriminals to use custom boot modes to take over Nexus 6 and 6P modems.
A team of researchers exposed gaps in booking systems security at a recent conference in Germany and encouraged GDS providers to upgrade their systems.
Security specialists have unearthed three PHP vulnerabilities that could have had serious consequences for organizations and consumers alike.
A recent IBM study revealed that many high-profile attacks against retail companies originate from vulnerabilities classified as low-hanging fruit.
IT managers should take advantage of the many resources available to help them monitor, manage and ultimately remediate vulnerabilities.
Vulnerability management is a critical part of any security program, but many IT professionals fail to realize that it starts with risk management.
The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.