June 27, 2017 GhostHook Attack Reveals Kernel-Level Threat in 64-Bit Windows Systems 2 min read - Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
June 26, 2017 Forgot Password? Man-in-the-Middle Attack Can Perform a Password Reset, Researchers Warn 2 min read - Many high-profile online services are vulnerable to a new type of attack that could enable fraudsters to intercept password reset requests.
June 26, 2017 Fireball Malware: Ticking Time Bomb or All Hot Air? 2 min read - Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
June 22, 2017 Stack Clash Bug Could Compromise Linux and Unix Defenses 2 min read - Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
June 22, 2017 Cryptocurrency Miner Digging Into PCs Based On NSA Exploit 2 min read - The protocol targets PCs with SMB vulnerabilities and runs a Monero cryptocurrency miner. Its infection rate peaked in April, totaling at 100,000 systems.
June 22, 2017 Website Security ‘Honor Roll’ Shows Firms Still Need to Work on Data Protection 2 min read - The OTA "Online Trust Audit and Honor Roll" graded more than 1,000 consumer-facing firms on website security and found that many are simply failing.
June 21, 2017 DVRs Prove IoT Malware Is Still Dangerous 2 min read - With its study of over 30 types of devices, U.K. security firm Pen Test Partners concluded that DVRs remain a major IoT malware platform.
June 20, 2017 Hidden PHP Rootkits Unearthed, Putting Apache Modules at Risk 2 min read - A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
June 20, 2017 IBM i2 QRadar Offense Investigator: The New i2 Cyber Threat Hunting App 2 min read - The all-new IBM i2 QRadar Offense Investigator makes it easier for cyberanalysts to gather and pinpoint data trends regarding vulnerabilities and threats.
June 19, 2017 Welcome to the New European X-Force Command Center in Wroclaw, Poland 3 min read - This week, IBM opened its refurbished and expanded X-Force Command Center in Wroclaw, Poland, to help clients manage their EU-based data more securely.