As security tools improve, malicious actors are increasingly operating as organized cybergangs and less sophisticated actors are falling behind, according to X-Force analysis of malware trends.
The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from 2017 that could continue into 2018.
Just like a college basketball team needs to know its X's and O's to win the big game and cut down the nets, a security team needs threat intelligence to win the ongoing battle against cyberthreats.
This week is "showtime" for IBM Think 2018 in Las Vegas! This blog will be updated regularly with the latest event announcements and highlights.
Cybercriminals are emulating PC malware to develop mobile banking Trojans that leverage malicious miners to steal cryptocurrency and deliver it to attacker-controlled wallets.
A collaborative defense strategy enables companies to unite siloed departments, integrate threat defense and extend security capabilities beyond the individual power of each tool.
XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.