Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon.
In 2018, IBM X-Force researchers observed organized cybercrime groups collaborating, rather than competing over turf or even attacking each other, for the first time.
According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.
Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware.
By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.
IBM X-Force saw a decline in ransomware in 2018 as cybercriminals shifted tactics to cryptojacking and attacks that don’t leverage malware.
Limor Kessem studied microbiology in school and planned to open a naturopathy clinic. She's now one of IBM Security's top cyber intelligence experts and a dedicated role model for women in security.
Nat Prakongpan was building enterprise networks for his school in Thailand in the seventh grade. Following a series of happy accidents, he found himself building an immersive cyber range for IBM.
Now that you've identified an AI solution and selected a suitable algorithm for your machine learning model, you're ready to measure the effectiveness of your security classifier.
The X-Force research team investigated the IcedID Trojan's two-step injection attack that enables it to steal access credentials and payment card data from e-commerce customers in North America.