When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.
IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.
Since June 27, IBM has been actively engaged in response and remediation efforts across our clients, services and products resulting from the new Petya variant. Although primarily focused in Ukraine, this attack produced global effects and left...
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
IBM X-Force attributed a recent wave of malware-induced Active Directory (AD) lockouts across several IR engagements to the operators of the QakBot Trojan.
OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
The "Ransomware Response Guide" can help your organization prepare for preventing this common threat or validate your existing security policies.