After nine months of tracking the cyber operations of threat group ITG07, IBM X-Force identified new Chafer-associated malware targeting companies within the travel and transportation industry.
High-risk, low-noise lateral movement attacks are becoming more common, and organizations need to adapt their strategic, tactical and operational defenses.
With Security Orchestration, Automation and Response, Your Incident Response Will SOAR to New Heights
The increasing complexity of the threat landscape has led SOC teams to adopt security orchestration, automation and response (SOAR) platforms to bring their incident response capabilities up to speed.
Recent attack campaigns involving the Qbot banking Trojan have been using a new persistence mechanism that helps the threat avoid detection, according to security researchers.
Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions.
IBM X-Force researchers observed cybercriminals engaging in three tax-themed malware campaigns.
IBM X-Force analyzed modifications made to IcedID that help the banking Trojan act more stealthily on infected devices.
A level 3 security analyst announced he'll be taking a six-month leave due to "seriously fatigued fingers" and "a wonky eye" resulting from his daily activities to ensure data security and compliance.
According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.
The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.