After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.
When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.
At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.
Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.
Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.
X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.