Advanced Threats August 31, 2015 Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks 7 min read - A brand -ew advanced banking Trojan discovered in the wild has been named Shifu by IBM Security X-Force, after the Japanese word for thief.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Intelligence & Analytics August 26, 2015 Preparing for the Global Era of Cybercrime 2 min read - The global era of cybercrime is upon us, and it's drastically changing the way organizations approach their cybersecurity strategies.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
Threat Intelligence August 20, 2015 Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing 5 min read - Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.
Malware August 20, 2015 Diagnosing the Details of a Malware Infection 2 min read - As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.
August 11, 2015 DGA Changer Malware Variant Shows How Attackers Are Improving Domain Names 2 min read - Researchers have discovered that those attackers behind the DGA Changer malware have come up with an even better way to avoid sandbox detection.
Intelligence & Analytics August 5, 2015 Information Security Is Not Stagnant, but Dynamic 2 min read - Information security has changed drastically in a short amount of time, but defense strategies are not keeping pace with its dynamic nature.
August 5, 2015 Remote Risk? New JavaScript Threats Look to Grab Control 2 min read - Two new JavaScript attacks look to leverage remote threats and wrest control from users, but there are simple ways to block these attacks.
Advanced Threats August 4, 2015 DDoS Extortion: Ransomware’s Older Cousin 2 min read - Though ransomware has been received a lot of press, extortion by threat of distributed denial-of-service (DDoS) attack is still very real — and dangerous.