Security News

Patched server, or working server. Pick one... IBM has withdrawn a patch for a significant security vulnerability in its WebSphere Application Server after the code knackered some systems.…

The unseen dangers inherent in artificial intelligence (AI) are proving the importance of IBM and Google’s diverse approach to this multifaceted problem. Brad Shimmin and Luciano C. Oviedo offer...

El Reg given leaked memo sent weeks before breach Exclusive Just weeks before a mega-breach, British Airways' (BA) parent was planning to outsource its cybersecurity to IBM, admitting it needed a...

IBM Researchers Describe "DeepLocker" as a Stealthy, Evasive, Targeted Attack Methodology in a Class of Its Own read more

Some 94 organizations now use the TradeLens blockchain platform to increase efficiency in global container shipping.

Qualys announced that IBM X-Force Red will leverage the Qualys Cloud Platform as part of its X-Force Red Vulnerability Management Services (VMS). As part of an expanded relationship, X-Force Red...

IBM Security announced X-Force Red Labs, a network of four secure facilities dedicated to testing the security of devices and systems including consumer and industrial IoT technologies, automotive...

IBM’s X-Force Red, a team of veteran hackers focused on finding security vulnerabilities in devices and systems, now has four new labs to work in. read more

No, X-Force Red is not another trading card game Black Hat IBM has promised to open four research centers that will hunt for security vulnerabilities in technology – including a team dedicated to...

Researchers discovered that two vulnerabilities in the Apache OpenWhisk serverless cloud platform could have allowed malicious actors to overwrite and execute arbitrary code. read more