Active loading indicator
1 – 30 of 648 items
[]
648 results
29 May 2025
Explainer
What Is Alert Fatigue?

Alert fatigue is a state of mental and operational exhaustion caused by an overwhelming number of alerts—many of which are low-priority, false positives or otherwise non-actionable.

Alert fatigue
27 May 2025
Mispadu (Ursa) C2C communication behind the scenes

Mispadu, or Ursa, is back. Learn more about the overlay financial malware, what the attacks look like and how to protect yourself and your assets from it.

Data security
20 May 2025
Oh non! Spear phishing campaign targets users in France using their leaked data, 160K+ victims

Since late March 2025, IBM Security has been closely monitoring a sophisticated spear phishing campaign designed to steal Amazon and Amazon Prime credentials and primarily targeting residents of France. Learn more.

Spear phishing
19 May 2025
Insights
Generative AI Makes Social Engineering More Dangerous—and Harder to Detect

In the age of generative AI, many traditionally reliable defenses against social engineering attacks no longer work.

Social engineering
15 May 2025
Explainer
What Is AI Security?

AI security uses artificial intelligence (AI) to enhance an organization's security posture.

AI security
15 May 2025
Explainer
What Is API Security?

API security is a set of practices and procedures that protect application programming interfaces (APIs) and the data they transmit from misuse, malicious bot attacks and other cybersecurity threats.

API security
14 May 2025
Operationalizing browser exploits to bypass Windows Defender Application Control (WDAC)

Previously discovering a method for bypassing even the strictest WDAC policies by backdooring trusted Electron applications, the IBM X-Force Red team continued their research and can now bypass the restriction of executing JavaScript code only.

Offensive security
13 May 2025
Rilide malware: How browser extensions are changing cyberattacks

Discovered in 2023, Rilide is a sophisticated piece of malware that targets Chromium-based browsers to hijack user activity and steal sensitive data. Learn more about the malware and how it operates.

Threat management
13 May 2025
Explainer
What is a Distributed Denial-of-Service (DDos) attack?

Distributed denial-of-service (DDoS) attacks flood websites and other network resources with malicious traffic, making apps and services unavailable to users.

Cyberattacks
12 May 2025
Explainer
What is Identity Security?

Identity security is a cybersecurity discipline focused on protecting digital identities and the systems that manage them.

Identity and access management
09 May 2025
Tutorial
What is Identity Threat Detection and Response (ITDR)?

Identity threat detection and response (ITDR) systems are proactive cybersecurity tools that monitor systems and apps to find and fix identity-based threats.

Identity and access management
02 May 2025
Explainer
What Is FIDO (Fast Identity Online) Authentication?

FIDO (Fast Identity Online) authentication is a set of open standards for passwordless authentication for websites, applications and online services.

Identity and access management
30 April 2025
Explainer
AI Fraud Detection in Banking

AI for fraud detection refers to implementing machine learning (ML) algorithms to mitigate fraudulent activities.

Fraud detection
30 April 2025
Insights
What's Behind the Rise in Vishing Incidents?

As cybersecurity teams thwart more direct hacks, attackers are turning to a quainter style of scam, with some new twists.

Malware
29 April 2025
Explainer
What Is a Vulnerability Assessment?

A vulnerability assessment is a systematic process used to identify, evaluate and report on security weaknesses across an organization’s digital environment.

Vulnerability assessment
29 April 2025
News
The software supply chain was always vulnerable—JP Morgan just said it out loud

An open letter from JP Morgan's Chief Information Security Officer shines a light on the urgent need for organizations to build security into their tools, technologies and process by default.

Security by design
28 April 2025
News
IBM X-Force Red releases m-Ray, an open-source mainframe vulnerability scanner

Kyri Lea and Elizabeth Christensen have developed m-Ray, an automated vulnerability scanner for IBM mainframes running the z/OS operating system.

Penetration testing
25 April 2025
Explainer
What is 2FA (Two-Factor Authentication)?

Two-factor authentication (2FA) verifies a user’s identity by asking for two pieces of proof, such as an online account password and a one-time passcode.

Two-factor authentication
24 April 2025
Explainer
What is MFA (Multifactor Authentication)?

Multifactor authentication (MFA) verifies a user’s identity by requiring at least two forms of proof, such as a password, fingerprint or other biometric data.

Multifactor authentication
22 April 2025
Podcast
Agentic AI: The emerging challenge in cybersecurity | AI in Action Podcast

Explore how agentic AI introduces new security concerns in this conversation between world-renowned cybersecurity leader Wendi Whitmore and David Levy

AI security
22 April 2025
Powering up: Abusing Power Apps to compromise on-prem servers

The X-Force Red team was able to breach a hardened external perimeter and gain code execution to an on-premises SQL server, resulting in full Active Directory compromise. Learn how they did it, and how to prevent it from happening to you.

Cloud security
15 April 2025
News
IBM X-Force Threat Analysis: Hive0148 observed targeting Mexico and Costa Rica

IBM X-Force observed Hive0148 spreading the Grandoreiro banking trojan to users in Mexico and Costa Rica. Learn more about this phishing and Malware-as-a-Service campaign.

Threat management
15 April 2025
Explainer
What is Enterprise Mobility Management (EMM)?

Enterprise mobility management (EMM) tools and services help organizations secure and manage mobile devices, apps and data.

Enterprise mobility management
11 April 2025
Explainer
What Is a Brute Force Attack?

A brute force attack uses trial-and-error to crack passwords or encryption keys and gain unauthorized access.

Brute force attack
08 April 2025
News
RemoteMonologue: Weaponizing DCOM for NTLM authentication coercions

The IBM X-Force Red team covers the fundamentals of COM and DCOM, dives into the RunAs setting and why authentication coercions are impactful and introduces a new credential harvesting tool - RemoteMonologue.

Adversary simulation
07 April 2025
Explainer
Physical Security in Cybersecurity

Most of us think of cybersecurity as a purely digital affair, but cyberattacks can actually begin right here in the physical world.

Physical security
25 March 2025
Explainer
What are Digital Credentials?

Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.

Digital credentials
25 March 2025
Insights
Why Social Engineering Still Works

Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.

Social engineering
18 March 2025
News
Bypassing Windows Defender Application Control with Loki C2

Microsoft offers a bug bounty for qualifying bypasses into Windows Defender Application Control. Learn how IBM's X-Force team found a bypass using Loki C2.

Adversary simulation
17 March 2025
Explainer
What Is Privilege Escalation?

Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.

Privileged access management
1 – 30 of 648 items