IBM QRadar Content for Sysmon enables security teams to detect advanced threats such as WannaCry as well as older, tried-and-true endpoint attacks.
IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.
The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.
Security professionals can leverage freely available, open source security tools to protect their environments from threats.
Although more than three-quarters of company directors reported a rise in cybersecurity awareness, only one-quarter actively share threat information.
An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.
Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Like a delicious guacamole, security teams need a perfect mix of IP addresses, MD5 checksum hashes and other threat intelligence to protect their networks.
A new, upgraded version of remote access malware Client Maximus points to the growing sophistication of cybercriminals in Brazil.
Companies looking to improve their ability to protect, control and monitor their technology infrastructures should follow this basic SIEM maturity model.