X-Force July 8, 2016 The Webshell Game Continues 5 min read - IBM X-Force researchers have noted a dramatic increase in the use of malicious webshell attacks throughout the first half of 2016.
X-Force July 5, 2016 BadTunnel: Bad News? 3 min read - The recently discovered BadTunnel could mean bad news for Microsoft Windows users — that is, unless they move to patch their systems immediately.
Threat Intelligence May 5, 2016 Telnet: An Attacker’s Gateway to the IoT 2 min read - Savvy cybercriminals are using older technologies such as Telnet to carry out attacks on IoT devices, a recent IBM Security report discovered.
X-Force May 5, 2016 Footprinting and Brute-Force Attacks Remain Prevalent 2 min read - With so much attention focused on APTs and mutating malware, it's easy to overlook brute-force attacks — which can still be successful.
Threat Intelligence April 14, 2016 Got WordPress? PHP C99 Webshell Attacks Increasing 5 min read - IBM MSS X-Force researchers found that C99 webshell attacks are increasing, particularly against content management systems such as WordPress.
Banking & Finance February 10, 2016 The New Bank Heist: The Financial Industry’s Top Threats 3 min read - The financial industry is plagued by a few main types of malware and cybercrime attacks, including Shellshock and denial-of-service attacks.
Software Vulnerabilities January 19, 2016 Blind SQL Injection: The Last Handkerchief Up the Attacker’s Sleeve 2 min read - Blind SQL injections are still being leveraged by actors to steal information. Here's what users need to know about these persistent attacks.
Threat Intelligence June 11, 2015 Got Linux? BillGates Botnet Activity on the Rise 3 min read - While it may be just one form of malware currently plaguing Linux systems, the BillGates botnet has recently increased its activity.
June 9, 2015 Game Over? Plug-In Flaw Targets Gamer Data 3 min read - A flaw in the Unity Web Player plug-in puts gamer data at risk, but this is just the tip of the iceberg. How do companies defend against plug-in problems?
Threat Intelligence June 1, 2015 The Threat Is Coming From Inside the Network: Insider Threats Outrank External Attacks 3 min read - Outside attackers can be harmful to an organization, but a significant number of data breaches involve either malicious or inadvertent insider threats.