Threat Intelligence January 8, 2018 Six Major Data Breach Trends From 2017 9 min read - IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
Advanced Threats January 3, 2018 CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data 6 min read - A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
Fraud Protection December 26, 2017 Beware of the Latest Punycode Attacks 2 min read - In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
December 7, 2017 Security Vulnerabilities in RFC-1342 Enable Spoofing and Code Injection Attacks 2 min read - Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.
Endpoint November 20, 2017 Wireless Security Lessons From the WPA2 Vulnerability 3 min read - One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
Energy & Utility November 14, 2017 Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry 2 min read - To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products.
Network November 9, 2017 Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes! 3 min read - There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
Advanced Threats November 2, 2017 Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening 2 min read - They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
October 30, 2017 DUHK Vulnerability Offers a Quick Way to Launch a Crypto Attack 2 min read - Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Threat Intelligence October 25, 2017 Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry 2 min read - An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.