A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.
IBM X-Force identified a new Trojan, dubbed IcedID, that uses advanced browser manipulation tactics to target financial institutions in the U.S. and U.K.
IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.