threat hunter

Who is a Threat Hunter and what role do they play?

With the growing technological world, cyberattacks are evolving to be more sophisticated than ever; furthermore, a lack of attention given to cyber threats—due to budget, technology, processes, and above all, the team of experts—has led to an increase in the number of successful malware attacks. Therefore, companies strive to implement rapid response to mitigate potential…

IBM Logo

Researcher Discloses 4 Zero-Day Vulnerabilities in IBM Data Risk Manager

A cybersecurity researcher disclosed four zero-day vulnerabilities in IBM’s enterprise security software after the company refused to fix the issues and acknowledge the private disclosure report. The vulnerabilities affect the IBM Data Risk Manager software ― a tool that provides companies with “a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business…