Threat Intelligence February 22, 2016 2016 IBM X-Force Report: Breaches Without Borders and Tales From the Cybercrime Underground 3 min read - The latest IBM X-Force Threat Intelligence Report revealed some interesting trends regarding cybercrime in 2015 — and noted how it surpassed expectations.
X-Force February 19, 2016 Social Security: Making the Most of Collaborative Defense With Threat Intelligence 2 min read - Building a collaborative defense requires sharing information among trustworthy sources on an efficient platform such as IBM's X-Force Exchange.
Cloud Security February 2, 2016 Tor: What Lies Beneath the Onion’s Skin 3 min read - Many people have heard of Tor, or The Onion Router, but how many actually know the details of this privacy tool and how it came to be?
Malware February 1, 2016 Organized Cybercrime Big in Japan: URLZone Now on the Scene 5 min read - IBM X-Force researchers have discovered a third cybercrime group using the URLZone malware to target banks and their unsuspecting customers in Japan.
Data Protection February 1, 2016 Winter Is Here! Are We Headed for an El Niño-Like Data Protection Landscape? 4 min read - Monitoring and tracking weather patterns is not that different from observing cyberthreats. Are you prepared with the best data protection strategies?
Advanced Threats January 22, 2016 Malware: Bigger and Badder Than Ever 2 min read - Malware underwent a major evolution in 2015, and traditional defenses need to be have dynamic intelligence if they hope to keep pace with these threats.
Threat Intelligence January 15, 2016 2016 Cybercrime Reloaded: Our Predictions for the Year Ahead 9 min read - 2015 was a big year for cybercrime, but 2016 may see even more advanced threats, sophisticated schemes and damaging data breaches.
Threat Intelligence December 29, 2015 Sharing Threat Information Is Easier With STIX 2 min read - STIX is the language used to share cyberthreats, and all security professionals and organizations should know how to use it effectively.
December 17, 2015 Report: Macro Malware Making a Comeback 2 min read - A recent study from one security firm indicated that macro malware is experiencing a renaissance among cybercriminals. Here's what you need to know.
December 16, 2015 The DDoS Attack: Most Victims Know Their Attackers 2 min read - According to a recent report, most victims of a DDoS attack claimed to know who their attackers were. Understanding motivations was not as clear.