The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.
A brand -ew advanced banking Trojan discovered in the wild has been named Shifu by IBM Security X-Force, after the Japanese word for thief.
IBM Security X-Force researchers recently discovered CoreBot, a seemingly generic malware that actually operates on a highly sophisticated level.
The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.
IBM X-Force researchers have discovered a new variant of the Tinba malware, which is specifically designed to target banks in Romania.
One Class to Rule Them All: New Android Serialization Vulnerability Gives Underprivileged Apps Super Status
IBM researchers recently revealed details about an Android serialization vulnerability, including recommendations for protecting mobile devices.