Threat Intelligence August 16, 2017 Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities 2 min read - The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
July 31, 2017 TrickBot Learns From WannaCry and Petya by Adding Self-Spreading Worm Module 2 min read - Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
Intelligence & Analytics July 19, 2017 Monitor Your Network for NotPetya in Real Time 3 min read - With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time.
July 17, 2017 Everlasting Issue? EternalBlue Scanning Apps Find 50,000 Susceptible Systems 2 min read - A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.
Data Protection July 13, 2017 Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far 4 min read - Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
July 10, 2017 NotPetya Operators Installed Three Backdoors on M.E.Doc Software Server Before Activating Malware 2 min read - New research revealed that the threat actors behind the recent NotPetya wiperware attacks had established three backdoors in the M.E.Doc servers.
Malware June 29, 2017 A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain 5 min read - Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.
Malware June 27, 2017 Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe 6 min read - It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.