Incident Response May 3, 2024 What we can learn from the best collegiate cyber defenders 3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a…
X-Force May 2, 2024 A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence 7 min read - This article was made possible thanks to contributions from Aaron Gdanski. IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique…
News May 1, 2024 New proposed federal data privacy law suggests big changes 3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several…
Artificial Intelligence April 30, 2024 AI cybersecurity solutions detect ransomware in under 60 seconds 2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in…
Artificial Intelligence April 30, 2024 AI cybersecurity solutions detect ransomware in under 60 seconds 2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in…
Risk Management April 24, 2024 Researchers develop malicious AI ‘worm’ targeting generative AI systems 2 min read - Researchers have created a new, never-seen-before kind of malware they call the “Morris II” worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on…
Identity & Access April 23, 2024 Passwords, passkeys and familiarity bias 5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly…
News April 29, 2024 The major hardware flaw in Apple M-series chips 3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability…
Artificial Intelligence April 25, 2024 NIST’s role in the global tech race against AI 4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success…
Risk Management April 24, 2024 Researchers develop malicious AI ‘worm’ targeting generative AI systems 2 min read - Researchers have created a new, never-seen-before kind of malware they call the “Morris II” worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on…