Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.
IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.
In 2017 and 2018, threat actors used a toolkit called KoffeyMaker in multiple black box ATM attacks targeting Eastern European financial institutions.
The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware.
With many enterprises unable to fill open roles for cybersecurity professionals, how can organizations boost collaboration to share security data and drive better outcomes?
In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.
A ransomware-as-a-service program called FilesLocker offers affiliates commissions of up to 75 percent on all revenue stolen from victims.
Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.
IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content.
Security researchers discovered a new malware-as-a-service offering designed to enable cybercriminals to infect Android phones and block users from running security solutions on their devices.