The cloud market today is full of references to the API economy. This is certainly with merit since the capabilities of an application programming interface (API) open the doors to a world of new applications, services and products.

APIs exist for cloud platforms in every major industry, and security is no exception. The tight integration between security solutions that APIs can make possible helps to close intelligence gaps that attackers might otherwise slip through. APIs also commonly provide threat intelligence for security infrastructure that enhances efficacy, provides valuable context and reduces your time-to-know and time-to-act on current and emerging threats.

The API of the IBM X-Force Exchange platform has provided threat intelligence integration capabilities to other applications since its inception. During the platform’s relatively short history, the platform and its API have continued to evolve, with improvements evident in the depth and breadth of the original X-Force threat intelligence available. Within the collaboration portal and the API, X-Force Exchange now provides granular intelligence like Threat Indicators and Observables, to higher order content like Campaigns and Tools, Tactics and Procedures (TTPs). X-Force Exchange can deliver this range of threat intelligence via the API, using two major specifications that allow users to use the method that best suits their needs.

RESTful API Support

Probably the most common method for accessing an API today is through a RESTful architectural interface that provides access to data in a reliable, scalable and simple manner. X-Force Exchange does this while providing threat intelligence information in JSON notation.

Users who are already familiar with this technology or have proprietary systems that can easily leverage a RESTful API would benefit quickly from this method. In addition, IBM has made the X-Force Exchange Node SDK available to help users get started with their integrations.

STIX/TAXII Support

X-Force Exchange also supports STIX and TAXII standards to allow for interoperability and automated machine-to-machine (M2M) exchange of threat intelligence. The adoption of these standards is where the true value of threat intelligence sharing really shines: It provides the ability for users to share information across different tools while abstracting away all the details of how threat intelligence information is captured, processed and exchanged across different platforms. These standards are gaining popularity across the spectrum of users and companies. Check Point Software Technologies, Soltra, Verisign, the United States Department of Defense (DoD) and many more organizations are actively involved in the evolution and promotion of STIX and TAXII via the OASIS IT standards consortium as the de facto standard for automated M2M threat intelligence exchange.

Threat Intelligence Use Cases

Over the last year, we’ve seen the X-Force Exchange API gain significant traction across a number of different use cases. The use cases commonly represent users interested in programmatically obtaining X-Force data to provide a new source of threat intelligence to their security infrastructure and/or operations.

Where the use cases differ is across different user types and their goals for threat intelligence integration:

  • The security analyst aims to implement an additional source of threat intelligence for their security infrastructure. This infrastructure may contain threat detection devices, a SIEM or a data analytics platform.
  • The managed security services provider, operating a security operations center (SOC), wants to help analysts speed their investigations and prioritize threats so that responders address the most severe issues first, increasing the provider’s overall efficiency.
  • The software provider looks to integrate threat intelligence into their product in a way that provides additional value in their offerings to their clients. From reputation to risk analysis, there are many IBM business partners that create and offer applications that integrate X-Force threat intelligence.

Sign up for a free trial of the IBM X-Force Exchange

With the value of threat intelligence and APIs well established, X-Force is introducing a new offering: IBM X-Force Exchange Commercial API. This will allow users to access the same X-Force threat intelligence available on the platform using a commercially-licensed API option which enjoys increased quota, enhanced query options, full support and the ability to integrate and resell products containing IBM X-Force content. The X-Force threat intelligence commercial API satisfies all the use cases for enhancing a security product or platform, a team’s efficacy and efficiency in a SOC, or a third-party security offering.

Learn More

More from Threat Intelligence

Strela Stealer: Today’s invoice is tomorrow’s phish

12 min read - As of November 2024, IBM X-Force has tracked ongoing Hive0145 campaigns delivering Strela Stealer malware to victims throughout Europe - primarily Spain, Germany and Ukraine. The phishing emails used in these campaigns are real invoice notifications, which have been stolen through previously exfiltrated email credentials. Strela Stealer is designed to extract user credentials stored in Microsoft Outlook and Mozilla Thunderbird. During the past 18 months, the group tested various techniques to enhance its operation's effectiveness. Hive0145 is likely to be…

Hive0147 serving juicy Picanha with a side of Mekotio

17 min read - IBM X-Force tracks multiple threat actors operating within the flourishing Latin American (LATAM) threat landscape. X-Force has observed Hive0147 to be one of the most active threat groups operating in the region, targeting employee inboxes at scale, with a primary focus on phishing and malware distribution. After a 3-month break, Hive0147 returned in July with even larger campaign volumes, and the debut of a new malicious downloader X-Force named "Picanha,” likely under continued development, deploying the Mekotio banking trojan. Hive0147…

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today