April 3, 2017 Massive Margins: DDoS Attack Profit Rates Hit 95 Percent 2 min read - A distributed DDoS attack can now net fraudsters revenue that any private company would envy: Done right, attackers can reach 95 percent profit margins.
Malware March 29, 2017 Commercial Malware Makes a Comeback in 2016 8 min read - According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.
Malware March 28, 2017 The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak 4 min read - After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
March 27, 2017 ICS Infections Are Fewer Than Previously Thought 2 min read - Recent research from the firm Dragos has shed some light on the actual number malware infections affecting industrial control systems (ICS).
Fraud Protection March 27, 2017 Hey Phishing, You Old Foe — Catch This Cognitive Drift? 4 min read - Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
March 24, 2017 It’s a Wild, Wild Word: New Macro Malware Now Infecting Both Windows and MacOS 2 min read - New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.
March 20, 2017 Unraveling GootKit’s Stealth Loader 2 min read - GootKit is an ongoing malware project that affects the three most popular browsers: Internet Explorer, Mozilla Firefox and Google Chrome.
Malware March 17, 2017 Churn Under the Surface of Global Cybercrime 2 min read - Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.
March 16, 2017 Petya Ransomware Gets Hijacked 2 min read - A new version of Petya ransomware, called PetrWrap, has been spotted by security researchers. This Trojan leverages old tricks to make fast money.
March 16, 2017 New POS Malware Leverages Modular Sleight of Hand to Exfiltrate Card Data 2 min read - Time for a show? New POS malware MajikPOS uses modular sleight-of-hand tricks and a variety of methods to gain system access for credit card info access.