Adversary Services
Simulating advanced threat actors takes industry-leading offensive research and capability development.
Read moreX-Force releases detection & response framework for managed file transfer software
X-Force certified containment: Responding to AD CS attacks
Poor communication during a data breach can cost you — Here’s how to avoid it
Defensive Security
In-depth IR coverage from the incident responders working to detect, contain and recover from attacks 24x7.
Read moreThreat Intelligence
Breaking research on the latest threats, vulnerabilities and trends from global security intelligence experts who provide industry-leading analysis.
Read moreHive0147 serving juicy Picanha with a side of Mekotio
IBM X-Force tracks multiple threat actors operating within the flourishing Latin American (LATAM) threat landscape. X-Force has observed Hive0147 to be one of the most active threat groups operating in the region,...
Read moreAbusing MLOps platforms to compromise ML models and enterprise data lakes
You just got vectored – Using Vectored Exception Handlers (VEH) for defense evasion and process injection
IoT exploitation during security engagements
X-Force discovers new vulnerabilities in smart treadmill
Offensive Security
Expert analysis from the X-Force Red hackers hired to break into organizations and help fix their most critical vulnerabilities.
Read more