Fraud Protection October 12, 2015 The Dyre Trojan and the Art of War < 1 min read - The Dyre Trojan is a great example of a threat that combines sophisticated tactics with an impressive strategy, resulting in a worthy cyber opponent.
Data Protection October 9, 2015 Economic Espionage: The Myth That ‘We Have Nothing of Interest’ 3 min read - The threat of economic espionage against the enterprise is more than just a myth — it's a reality that organizations must prepare for and defend.
Malware October 2, 2015 UK Banks Hit With New Zeus Sphinx Variant and Renewed Kronos Banking Trojan Attacks 6 min read - IBM Security X-Force researchers have discovered instances of the Kronos banking Trojan and Zeus Sphinx malware being used by cybercriminals in the wild.
Malware September 30, 2015 Ransomware Goes Back to the Future 3 min read - Ransomware remains a common attack, and it will continue to be a popular choice for cybercriminals until enterprises improve end user education.
September 29, 2015 XOR DDoS Attack Tool Being Used to Launch Over 20 Daily Attacks 3 min read - Threat actors are using a previously discovered DDoS attack tool to launch over 20 daily attacks against legitimate organizations, new research showed.
September 29, 2015 Researchers: The Best Way to Curb Cybercrime May Be to Make It More Expensive 2 min read - Recent research from Google suggested that one of the most effective ways to curb cybercrime is to make it more expensive for criminals to carry out.
September 24, 2015 Building a Bug Bounty? Start Here 3 min read - Many companies are now considering their own bug bounty program, and HackerOne has designed a free assessment tool to get the ball rolling.
September 24, 2015 Data Breach Syndrome: Poor Prognosis for Health Care? 2 min read - Health care companies are high-priority targets for cybercriminals. Is there some way for health agencies to combat this data breach syndrome?
Banking & Finance September 9, 2015 Transforming the Business of Cybercrime 2 min read - Cybercrime is an ever-evolving endeavor for malicious actors, and financial institutions must employ the latest controls and strategies to remain secure.
Threat Intelligence September 9, 2015 Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity 10 min read - IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.