March 4, 2016 By Pamela Cobb 2 min read

I had the pleasure of attending the IBM InterConnect conference in February, and my colleagues like to make fun of the fact that I plan my hotel stay so I strategically walk by a certain chocolate megastore on the Vegas Strip on my way to the conference. My passion for highlighting the great security research from IBM X-Force rivals my love of the combination of chocolate and peanut butter, so it’s a bonus I get to combine the two things at the InterConnect conference.

In 2015, we started integrating security research publications across the IBM Security division under the IBM X-Force name. After all, for over 20 years, the X-Force brand has stood for expert analysis and threat intelligence to educate and better protect clients. It’s with excitement that we are offering a two-part webinar series to highlight the latest trend research being published.

A New IBM X-Force Series

The upcoming “2015 Security by the Numbers: Trends and Insights From IBM X-Force” series will, at a macro level, discuss the recently released “2016 IBM X-Force Threat Intelligence Report,” highlighting trends on cybercrime, emerging attack types and how breaches of durable personally identifiable information (PII) are offering attackers inroads to corporate networks.

Later in the month, we invite you to take a deep dive on the 2016 IBM X-Force Cyber Security Intelligence Index, which examines the major threats that IBM’s own Security Services clients faced in 2015. This will help you better understand the current threat landscape by offering a detailed look at the volume of attacks, the industries most affected, the most prevalent types of attacks and attackers and the key factors enabling them.

Two Great Tastes that Taste Great Together

In both webinars, experts within IBM X-Force share their insights and recommendations on how to best protect your network and valuable digital assets. While financial gain is still a significant motivator for cybercriminals, it’s by no means the only one, as we see in both the macro industry trends and within our own client base.

Last year’s attackers branched out in a big way, inflicting physical damage and pilfering intellectual property and sensitive personal data, which they can, in turn, use to further infiltrate even bigger financial targets through social engineering.

Having these two publications under the IBM X-Force brand brings two great things together: the macro and micro look at the latest trends and the details on how they are affecting companies like yours.

Register for the IBM X-Force Webinar series

More from X-Force

Strela Stealer: Today’s invoice is tomorrow’s phish

12 min read - As of November 2024, IBM X-Force has tracked ongoing Hive0145 campaigns delivering Strela Stealer malware to victims throughout Europe - primarily Spain, Germany and Ukraine. The phishing emails used in these campaigns are real invoice notifications, which have been stolen through previously exfiltrated email credentials. Strela Stealer is designed to extract user credentials stored in Microsoft Outlook and Mozilla Thunderbird. During the past 18 months, the group tested various techniques to enhance its operation's effectiveness. Hive0145 is likely to be…

Hive0147 serving juicy Picanha with a side of Mekotio

17 min read - IBM X-Force tracks multiple threat actors operating within the flourishing Latin American (LATAM) threat landscape. X-Force has observed Hive0147 to be one of the most active threat groups operating in the region, targeting employee inboxes at scale, with a primary focus on phishing and malware distribution. After a 3-month break, Hive0147 returned in July with even larger campaign volumes, and the debut of a new malicious downloader X-Force named "Picanha,” likely under continued development, deploying the Mekotio banking trojan. Hive0147…

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today