In the final issue of 2015, the IBM X-Force Threat Intelligence Quarterly shifts the focus to our in-house experts at IBM Security Services. With its extensive global reach and experience addressing cyber security concerns and incidents affecting clients across a broad range of industries, IBM’s Security Services team is uniquely positioned to garner insights and identify common threads. These threads are woven together to form a picture of current security trends, techniques and tools used by cybercriminals, as well as reoccurring gaps in our clients’ security postures.

Read this issue of the IBM X-Force Threat Intelligence Quarterly to learn more from the security research experts at IBM X-Force about how to protect your network.

  • The top four trends our experts saw this year include “onion-layered” attacks where unsophisticated attacks are inadvertently drawing attention away from stealthier infiltrations.
  • As security incidents and breaches continue to make headlines, executives in the boardroom are asking more questions about security policies.  Learn how you can help better prepare your organization through regularly maintained security procedures and response plans.
  • Focusing on security fundamentals can strengthen your security posture.
  • A defense-in-depth strategy provides a roadmap to help identify advanced attacks using indicators of compromise, helping any organization reduce the risks we see today and expect tomorrow.

Download the complete IBM X-Force Threat Intelligence Quarterly – 4Q 2015

More from Advanced Threats

Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why threat hunting should be a baseline activity in any environment. Before you can embark on a threat hunting exercise, however, it’s important to understand how to build, implement and mature a repeatable, internal threat hunting program. What are the components…

Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data

Shopping online is an increasingly popular endeavor, and it has accelerated since the COVID-19 pandemic. Online sales during the 2021 holiday season rose nearly 9% to a record $204.5 billion. Mastercard says that shopping jumped 8.5% this year compared to 2020 and 61.4% compared to pre-pandemic levels. Cyber criminals are not missing this trend. The Ramnit Trojan, in particular, is out for a shopping spree that’s designed to take over people’s online accounts and steal their payment card data. IBM…

Detections That Can Help You Identify Ransomware

One of the benefits of being part of a global research-driven incident response firm like X-Force Incidence Response (IR) is that the team has the ability to take a step back and analyze incidents, identifying trends and commonalities that span geographies, industries and affiliations. Leveraging that access and knowledge against the ransomware threat has revealed tools, techniques and procedures that can often be detected through the default Windows event logs (WELs). In particular, the X-Force IR team has identified several…

How to Report Scam Calls and Phishing Attacks

With incidents such as the Colonial Pipeline infection and the Kaseya supply chain attack making so many headlines these days, it can be easy to forget that malicious actors are still preying on individual users. They're not using ransomware to do that so much anymore, though. Not since the rise of big game hunting, anyway. This term marks ransomware actors' shift away from attacks against individual users and towards operations targeting large enterprises, noted CNBC. But attacks like phishing and…

Your browser doesn't support HTML5 audio
Press play to continue listening
00:00 00:00