Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.
IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content.
X-Force observed attackers using known Drupal vulnerabilities, including Drupalgeddon, to target websites and the underlying infrastructure that hosts them, leveraging Shellbot to open backdoors.
By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.
X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.
A new threat intelligence sharing network allows companies to control both who has access to information and the quality of anonymous threat data they consume.
By conducting regular and comprehensive cyberthreat hunting, organizations can stay one step ahead of malicious actors and soften the blow of a data breach.
Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.
New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value
Gartner's new report recommends factoring severity, asset value and active exploits into your vulnerability management process.
Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.