The X-Force Exchange API offers a host of capabilities that can increase threat intelligence and information sharing among users.
The IBM X-Force Security Research team has discovered some interesting new information involving the Dyre Trojan, which is now targeting Spanish banks.
The DEF CON, Black Hat and BSides conferences all descend on Las Vegas this August. But which of these gatherings is the best bet for you?
Successfully reducing the threat of financial crime requires collaboration and intelligence sharing across different financial institutions.
Source code for the builder and control panel of the ZeusVM malware has been leaked online, creating powerful tools for would-be cybercriminals.
When it comes to endpoint protection, most IT security and operations teams function a lot like the pairs in a chaotic three-legged race.
Modern techniques and tools can assist security professionals with digging in and identifying the key indicators of compromise (IoC) on a network.
Security researchers on the lookout for another resource to help with malware detection should consider the pattern-matching tool YARA.
The Stegoloader malware is built to be stealthy and evasive, so it requires an advanced protection program to detect its presence and stop any damage.
Standards and specifications make threat intelligence sharing a more manageable and organized act, although competing standards may still muddy the waters.