In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.
One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products.
There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
Using a simple online search engine, a researcher exposed several shipping industry security gaps that could leave container ships vulnerable to threats.