IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.
One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products.
There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.