March 16, 2020 Cookiethief: Cookie-Stealing Trojan Targets Social Media Accounts 2 min read - Researchers spotted a new cookie-stealing Trojan called "Cookiethief" that is targeting users' social media accounts and browsers.
Software Vulnerabilities March 16, 2020 Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers 6 min read - It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.
CISO March 13, 2020 Inadvertent Insider Threats Present a Unique Challenge to Organizations 4 min read - While we may imagine inadvertent insider threats as careless people clicking on dodgy emails, this image needs to be updated to include a wide variety of poor security hygiene behaviors.
Malware March 12, 2020 PXJ Ransomware Campaign Identified by X-Force IRIS 4 min read - In a recent analysis from IBM's X-Force Incident Response and Intelligence Services (IRIS), our team discovered activity related to a new strain of ransomware known as PXJ ransomware.
Healthcare March 11, 2020 Safeguarding Healthcare for the Future With Zero Trust Security 5 min read - A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.
Incident Response March 6, 2020 How a More Connected Approach Can Help With Threat Management 3 min read - Using capabilities that maximize and connect existing security solutions and data sources can help organizations advance their threat management initiatives in multiple ways.
Cloud Security March 5, 2020 Embracing the Power of Community for Better Security 3 min read - Threat actors seem to do better than defenders in a key area: collaboration. To effectively fight threats, we need to collaborate as a community and reimagine security as an open construct.
March 3, 2020 Researchers Estimate Krøøk Vulnerability Could Put a Billion Wi-Fi Devices at Risk 2 min read - Researchers estimate more than a billion devices may be vulnerable to a cyberthreat dubbed Krøøk that can intercept and decrypt Wi-Fi traffic using WPA2 connections.
Threat Intelligence March 3, 2020 State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends 6 min read - Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.
Intelligence & Analytics March 2, 2020 Leverage ATT&CK for ICS to Secure Industrial Control Systems 3 min read - The core of MITRE ATT&CK for ICS provides an overview of the TTPs associated with threat actors that have carried out attacks against ICS systems.