March 18, 2020 Snoop Attacks via L1 Data Sampling Threaten Security of Intel CPUs 2 min read - Intel processors, including Core and Xeon products, are susceptible to attacks described as Snoop-assisted L1 data sampling, a security investigator has discovered.
Advanced Threats March 18, 2020 EnigmaSpark: Politically Themed Cyber Activity Highlights Regional Opposition to Middle East Peace Plan 9 min read - In recent analysis of malicious activity likely targeting entities based in the Middle East, IBM X-Force IRIS discovered a backdoor malware strain we named "EnigmaSpark."
Fraud Protection March 17, 2020 2020 Tax Fraud Trends: How to Protect Yourself at Home and Work 8 min read - Scammers view tax season as a prime recruiting season for victims. Here are the most prominent tax fraud trends in 2020 and how to protect your identity and business from risks.
March 16, 2020 Cookiethief: Cookie-Stealing Trojan Targets Social Media Accounts 2 min read - Researchers spotted a new cookie-stealing Trojan called "Cookiethief" that is targeting users' social media accounts and browsers.
Software Vulnerabilities March 16, 2020 Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers 6 min read - It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.
CISO March 13, 2020 Inadvertent Insider Threats Present a Unique Challenge to Organizations 4 min read - While we may imagine inadvertent insider threats as careless people clicking on dodgy emails, this image needs to be updated to include a wide variety of poor security hygiene behaviors.
Malware March 12, 2020 PXJ Ransomware Campaign Identified by X-Force IRIS 4 min read - In a recent analysis from IBM's X-Force Incident Response and Intelligence Services (IRIS), our team discovered activity related to a new strain of ransomware known as PXJ ransomware.
Healthcare March 11, 2020 Safeguarding Healthcare for the Future With Zero Trust Security 5 min read - A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.
Incident Response March 6, 2020 How a More Connected Approach Can Help With Threat Management 3 min read - Using capabilities that maximize and connect existing security solutions and data sources can help organizations advance their threat management initiatives in multiple ways.
Cloud Security March 5, 2020 Embracing the Power of Community for Better Security 3 min read - Threat actors seem to do better than defenders in a key area: collaboration. To effectively fight threats, we need to collaborate as a community and reimagine security as an open construct.