July 7, 2015 Data Leak Could Let Almost Anyone Make ZeusVM Malware Variant 2 min read - Source code for the builder and control panel of the ZeusVM malware has been leaked online, creating powerful tools for would-be cybercriminals.
Endpoint July 7, 2015 Winning the Three-Legged Race Toward Endpoint Protection 2 min read - When it comes to endpoint protection, most IT security and operations teams function a lot like the pairs in a chaotic three-legged race.
Intelligence & Analytics July 1, 2015 Hidden Warnings: A Look at Indicators of Compromise (IoC) 2 min read - Modern techniques and tools can assist security professionals with digging in and identifying the key indicators of compromise (IoC) on a network.
Intelligence & Analytics June 24, 2015 Signature-Based Detection With YARA 4 min read - Security researchers on the lookout for another resource to help with malware detection should consider the pattern-matching tool YARA.
Advanced Threats June 22, 2015 Stopping the Evasive Stegoloader Malware 4 min read - The Stegoloader malware is built to be stealthy and evasive, so it requires an advanced protection program to detect its presence and stop any damage.
X-Force June 19, 2015 Navigating a Sea of Threat Intelligence Specifications 7 min read - Standards and specifications make threat intelligence sharing a more manageable and organized act, although competing standards may still muddy the waters.
Malware June 4, 2015 Detecting and Analyzing Kernel-Based Malware 3 min read - The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
Intelligence & Analytics June 1, 2015 Comparing Free Online Malware Analysis Sandboxes 6 min read - Free malware analysis sandboxes can be used as a means of enhancing cybersecurity without a major drain on time, money and other resources.
May 21, 2015 Security Analytics Gets Top Marks but Low Numbers — What Gives? 2 min read - Security analytics gets top marks from IT pros but scores low in penetration. What's preventing this new technology from gaining ground?
Threat Intelligence May 19, 2015 Perimeter Protection Is Not Enough 3 min read - IBM X-Force Exchange is giving organizations a safe, anonymous way to share intelligence to move beyond simple perimeter protection.