Intelligence & Analytics August 26, 2015 Preparing for the Global Era of Cybercrime 2 min read - The global era of cybercrime is upon us, and it's drastically changing the way organizations approach their cybersecurity strategies.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
X-Force August 24, 2015 Anonymity and Cryptocurrencies Enabling High-Stakes Extortion 3 min read - The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
Threat Intelligence August 20, 2015 Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing 5 min read - Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.
Malware August 20, 2015 Diagnosing the Details of a Malware Infection 2 min read - As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.
Threat Intelligence August 18, 2015 Gozi Goes to Bulgaria — Is Cybercrime Heading to Less Charted Territory? 4 min read - The latest version of the Gozi banking Trojan looks to target banks in Bulgaria. This could be just the first instance of the malware in Eastern Europe.
August 11, 2015 DGA Changer Malware Variant Shows How Attackers Are Improving Domain Names 2 min read - Researchers have discovered that those attackers behind the DGA Changer malware have come up with an even better way to avoid sandbox detection.
Advanced Threats August 6, 2015 Are These Airline Hacks Related? 3 min read - Several confirmed or suspected hacks of major airlines wreaked havoc on global travelers, but were there more to these attacks than meets the eye?
Intelligence & Analytics August 5, 2015 Information Security Is Not Stagnant, but Dynamic 2 min read - Information security has changed drastically in a short amount of time, but defense strategies are not keeping pace with its dynamic nature.