Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Organizations affected by the WannaCry ransomware attack can leverage IBM X-Force Threat Intelligence with QRadar to mitigate this unprecedented threat.
An effective vulnerability management strategy requires continuous visibility into endpoint activity and real-time control over devices in a network.
The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.
As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.
Mind the Gap: Closing Vulnerability Management Exposure With IBM BigFix and QRadar Vulnerability Manager (QVM)
IBM BigFix and QRadar Vulnerability Manager (QVM) can help security professionals close the vulnerability management exposure gap and prevent breaches.
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
Vulnerability management is a critical part of any security program, but many IT professionals fail to realize that it starts with risk management.