IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.
Like a delicious guacamole, security teams need a perfect mix of IP addresses, MD5 checksum hashes and other threat intelligence to protect their networks.
Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.
To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.
EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.