March 4, 2016 By Pamela Cobb 2 min read

I had the pleasure of attending the IBM InterConnect conference in February, and my colleagues like to make fun of the fact that I plan my hotel stay so I strategically walk by a certain chocolate megastore on the Vegas Strip on my way to the conference. My passion for highlighting the great security research from IBM X-Force rivals my love of the combination of chocolate and peanut butter, so it’s a bonus I get to combine the two things at the InterConnect conference.

In 2015, we started integrating security research publications across the IBM Security division under the IBM X-Force name. After all, for over 20 years, the X-Force brand has stood for expert analysis and threat intelligence to educate and better protect clients. It’s with excitement that we are offering a two-part webinar series to highlight the latest trend research being published.

A New IBM X-Force Series

The upcoming “2015 Security by the Numbers: Trends and Insights From IBM X-Force” series will, at a macro level, discuss the recently released “2016 IBM X-Force Threat Intelligence Report,” highlighting trends on cybercrime, emerging attack types and how breaches of durable personally identifiable information (PII) are offering attackers inroads to corporate networks.

Later in the month, we invite you to take a deep dive on the 2016 IBM X-Force Cyber Security Intelligence Index, which examines the major threats that IBM’s own Security Services clients faced in 2015. This will help you better understand the current threat landscape by offering a detailed look at the volume of attacks, the industries most affected, the most prevalent types of attacks and attackers and the key factors enabling them.

Two Great Tastes that Taste Great Together

In both webinars, experts within IBM X-Force share their insights and recommendations on how to best protect your network and valuable digital assets. While financial gain is still a significant motivator for cybercriminals, it’s by no means the only one, as we see in both the macro industry trends and within our own client base.

Last year’s attackers branched out in a big way, inflicting physical damage and pilfering intellectual property and sensitive personal data, which they can, in turn, use to further infiltrate even bigger financial targets through social engineering.

Having these two publications under the IBM X-Force brand brings two great things together: the macro and micro look at the latest trends and the details on how they are affecting companies like yours.

Register for the IBM X-Force Webinar series

More from X-Force

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Getting “in tune” with an enterprise: Detecting Intune lateral movement

13 min read - Organizations continue to implement cloud-based services, a shift that has led to the wider adoption of hybrid identity environments that connect on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices in these hybrid identity environments, Microsoft Intune (Intune) has emerged as one of the most popular device management solutions. Since this trusted enterprise platform can easily be integrated with on-premises Active Directory devices and services, it is a prime target for attackers to abuse for conducting…

You just got vectored – Using Vectored Exception Handlers (VEH) for defense evasion and process injection

10 min read - Vectored Exception Handlers (VEH) have received a lot of attention from the offensive security industry in recent years, but VEH has been used in malware for well over a decade now. VEH provides developers with an easy way to catch exceptions and modify register contexts, so naturally, they’re a ripe target for malware developers. For all the attention they’ve received, nobody had publicized a way to manually add a Vectored Exception Handler without relying on the built-in Windows APIs which…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today