X-Force March 18, 2016 Is It the Breadth of the Breach or the Value of the Volume? 3 min read - Organizations that suffer a breach face extremely high costs, but cybercriminals don't have to cough up as much to start building profiles of victims.
February 19, 2016 Taking the Bait: Leaked Data Grabs Attackers’ Attention 2 min read - A recent study highlighted how quickly cybercriminals go after leaked data as well as what they do with that information after it's been compromised.
Fraud Protection February 11, 2016 Dark Web Suppliers and Organized Cybercrime Gigs 5 min read - Suppliers offering cybercrime-as-a-service on the Dark Web are helping organized groups achieve more effective bank fraud schemes.
Threat Intelligence January 15, 2016 2016 Cybercrime Reloaded: Our Predictions for the Year Ahead 9 min read - 2015 was a big year for cybercrime, but 2016 may see even more advanced threats, sophisticated schemes and damaging data breaches.
Advanced Threats November 9, 2015 Cybercriminals Phish Their Way Into Customer Loyalty Programs 3 min read - Loyalty programs can bring big rewards to customers, but they also may make organizations more appealing to cybercriminals looking to steal data.
Threat Intelligence September 9, 2015 Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity 10 min read - IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
Fraud Protection August 27, 2015 Why Tax Refund Fraud Losses Are Growing Rapidly 8 min read - Tax refund fraud is catching the attention of cybercriminals, who are committing identity theft to claim a piece of this billion-dollar industry.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
X-Force August 24, 2015 Anonymity and Cryptocurrencies Enabling High-Stakes Extortion 3 min read - The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Intelligence & Analytics July 17, 2015 What Surfaces From the Deep, Dark Web 2 min read - Terms like Dark Web and Deep Web have started to pierce the bubble of popular culture, but most users aren't aware of the full scope of dangers present.