An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
According to a new report, threat actors are targeting enterprise resource planning (ERP) applications like SAP — and, in some cases, are exploiting a vulnerability that was disclosed in 2016.
According to a recent threat advisory, cybercriminals have combined a new encrypted downloader with old-school macro malware to gain backdoor access to victims' machines.
Threat group RANCOR is leveraging new malware strains to conduct targeted espionage in Southeast Asia, according to a recent report.
In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
A July 2018 threat report from IBM X-Force Exchange revealed that threat group Magecart exploited unsecured third-party access to steal credit card details from Ticketmaster customers.
According to July 2018 research, cybercriminals are offering remote desktop protocol (RDP) access to compromised networks at major airports, healthcare institutions and more for under $20.
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
The Science Channel documentary, "Dark Web: Fighting Cybercrime," shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.