IBM's X-Force Exchange emphasizes collaboration and intelligence sharing, using strategies used in the Dark Web to promote security and defeat criminals.
IBM's X-Force Application Security Research Team has discovered a memory disclosure vulnerability in iOS IOKit IOMobileFrameBuffer.
Threat intelligence sharing is becoming imperative for improving organizations' security, but it needs the right collaborative approach to be successful.
IBM X-Force recently released an interactive data breach chart that helps visualize the different types of data breaches that have been reported over time.
Today, IBM released the first 2015 X-Force Threat Intelligence Quarterly, along with the announcement of the X-Force Interactive Security Incident website.
In the second part of this two-part series, IBM's Mark Yason discusses in more depth the Regin plugin framework hosted in the dispatcher module.
The Infrastructure Protection track at InterConnect will feature insights from the IBM X-Force Research and Development team and customer success stories.
A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
IBM would like to honor Michael Hamelin, a former X-Force employee who was tragically killed in an automobile accident in December 2014.
Here is a look at the remote code execution bug in OpenSSL's DTLS, how it works and the different ways cybercriminals might leverage it for exploitation.