Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.
To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.
EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.
Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.