January 23, 2017 Zero-Day Deals? Shadow Brokers Looking for Windows Exploit Buyer 2 min read - The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?
Endpoint November 4, 2016 The Internet of Trouble: Securing Vulnerable IoT Devices 5 min read - In the past few months, researchers have observed large-scale DDoS attacks that leverage vulnerable IoT devices to create massive botnets.
July 26, 2016 Cisco Announces Critical Router Vulnerability < 1 min read - Cisco recently disclosed a critical vulnerability in its software. According to the advisory, no workaround is currently available to resolve the issue.
Endpoint April 29, 2016 It’s Time to Let Go of QuickTime for Windows 2 min read - IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities.
April 15, 2016 Uninstall QuickTime for Windows Now 2 min read - QuickTime for Windows will soon be unsupported, and security researchers have identified at least two zero-day vulnerabilities that will not be patched.
December 7, 2015 Nerding Out: Collaboration Deal Downs Dorkbot 2 min read - A collaborative effort from law enforcement, tech vendors and security agencies took down a Dorkbot botnet that was more than 1 million computers strong.
October 19, 2015 Dridex Trojan Remains a Risk Even Following Takedown Operation and FBI Arrest 2 min read - Security companies said the Dridex Trojan may still be attacking potential victims in the U.K. despite a recent arrest and attempts to shut it down.
X-Force June 19, 2015 Navigating a Sea of Threat Intelligence Specifications 7 min read - Standards and specifications make threat intelligence sharing a more manageable and organized act, although competing standards may still muddy the waters.
May 27, 2015 IC3 Internet Crime Report Shows Social Media Complaints Have Quadrupled in Five Years 2 min read - Social media-related scams including clickjacking, doxing and pharming are noticeably on the rise, based on the recent IC3 Internet Crime Report.
May 4, 2015 Nepal Earthquake Email Scams Could Lead Would-Be Donors to Malware 2 min read - Authorities say Nepal earthquake email scams could be directing users to phishing sites that contain malware under the guise of giving to charity.