September 15, 2015 IoT Warning: FBI Says More Devices Equal Bigger Attack Surface 2 min read - The FBI's Internet Crime Complaint Center (IC3) is now warning about new IoT risks and the larger attack surface connected devices present.
Malware September 10, 2015 An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware 6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
Advanced Threats August 31, 2015 Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks 7 min read - A brand -ew advanced banking Trojan discovered in the wild has been named Shifu by IBM Security X-Force, after the Japanese word for thief.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Intelligence & Analytics August 26, 2015 Preparing for the Global Era of Cybercrime 2 min read - The global era of cybercrime is upon us, and it's drastically changing the way organizations approach their cybersecurity strategies.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
Threat Intelligence August 20, 2015 Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing 5 min read - Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.
Malware August 20, 2015 Diagnosing the Details of a Malware Infection 2 min read - As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.
August 11, 2015 DGA Changer Malware Variant Shows How Attackers Are Improving Domain Names 2 min read - Researchers have discovered that those attackers behind the DGA Changer malware have come up with an even better way to avoid sandbox detection.
Intelligence & Analytics August 5, 2015 Information Security Is Not Stagnant, but Dynamic 2 min read - Information security has changed drastically in a short amount of time, but defense strategies are not keeping pace with its dynamic nature.