In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
Indicators of compromise are key data points used during an incident response process. Regularly testing the reliability of your indicators can make all the difference in your IT security process.
A July 2018 threat report from IBM X-Force Exchange revealed that threat group Magecart exploited unsecured third-party access to steal credit card details from Ticketmaster customers.
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
Today's security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.
As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don't know how to get the most out of their security information and event management (SIEM) solution.
IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis.
Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.