Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
A cybergang known as FIN7 has been using OLE command files to spread its malware and identify potential victims for additional phishing attacks.
A traditional malware sandbox running OS-level analysis is prone to missing sophisticated threats and advanced evasion techniques.
A cyberattack by the author of BrickerBot left 60,000 users without internet in India. The attack was linked to an external connections vulnerability.
A new report detailed how Adwind, a remote access tool, is surging in popularity and putting countless users at risk for cyberattack.
Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.
Since June 27, IBM has been actively engaged in response and remediation efforts across our clients, services and products resulting from the new Petya variant. Although primarily focused in Ukraine, this attack produced global effects and left...
Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
IBM X-Force Malware Analysis enables security teams to examine potentially problematic files, prioritize events and respond to threats quickly.