November 15, 2016 Researchers Try to Create Malware Chip 2 min read - The NSF is sponsoring an attempt to build a malware chip capable of detecting anomalies in system processes and alerting local security software.
November 9, 2016 Exaspy Spyware Is Available as a Service 2 min read - Exaspy spyware, which infects Android phones to intercept text messages, emails and other communications, is available as a commodity service online.
Advanced Threats November 9, 2016 Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations 6 min read - Researchers discovered a new banking Trojan, TrickBot, that appears to borrow an uncommon webinjection technique from the infamous Dyre family of malware.
Malware November 8, 2016 An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK 3 min read - IBM X-Force researchers reported that TrickBot is fully operational and already capable of deploying two of the most advanced browser manipulation methods.
Threat Intelligence November 8, 2016 Consequences of IoT and Telnet: Foresight Is Better Than Hindsight 4 min read - Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
November 7, 2016 Ponemon Reports Threat Intelligence Overloads 2 min read - A threat intelligence program requires a strong platform and a reliable threat analyst to make sense of the data that might overwhelm regular IT employees.
Intelligence & Analytics November 4, 2016 It Only Has to Happen Once: Protecting Your Brand in the Digital Age 4 min read - The challenge of protecting your brand is growing as ransomware and other targeted attacks become increasingly frequent and complex.
November 3, 2016 Sundown Exploit Kit Poised for Growth 2 min read - With heavyweight exploit kits like Nuclear, Angler and Neutrino out of the picture, the Sundown exploit kit appears poised for growth in the near future.
November 3, 2016 Vanishing Point: New PLC Malware Leverages Processor Problems to Go Dark 2 min read - Security researcher Ali Abbasi developed a new type of PLC malware that leverages existing problems related to microprocessors and avoids detection.
CISO October 26, 2016 10 Cybersecurity Lessons From 10 Years’ Experience at IBM 3 min read - IBM Security Director of strategy and product design Kevin Skapinetz shared 10 cybersecurity lessons he picked up in his decade of experience in IT.