Threat intelligence provides the context SOC analysts need to proactively identify DNS security threats and prevent future DNS attacks.
A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.
IBM X-Force researchers detected, reverse engineered, reconstructed and simulated a Delphi-based Brazilian remote access Trojan.
IBM X-Force researchers discovered, reverse engineered and reconstructed AVLay, a remote access Trojan that mixes DLL hijacking with a legitimate executable borrowed from various antivirus programs.
X-Force researchers discovered a new remote access Trojan variant that mixes Dynamic Link Library (DLL) hijacking with a legitimate executable borrowed from various antivirus programs.
As the darknet slips further underneath the surface, it's time for the enterprise to look deeper than surface-level cyberthreat intelligence.
Having access to or generating cyber threat intelligence doesn't automatically translate into better security outcomes. So how can organizations squeeze the most out of their intelligence practices?
Many organizations understand the importance of threat hunting but simply lack enough time or resources. Here are some tips to help you start thinking like a threat hunter, regardless of your budget.
The security industry does a thorough job of conveying the latest cybersecurity news, albeit sometimes to the detriment of the people whose job it is to set security priorities.
After nine months of tracking the cyber operations of threat group ITG07, IBM X-Force identified new Chafer-associated malware targeting companies within the travel and transportation industry.