Threat Intelligence August 17, 2017 Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime 4 min read - IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
Threat Intelligence August 16, 2017 Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities 2 min read - The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
July 31, 2017 TrickBot Learns From WannaCry and Petya by Adding Self-Spreading Worm Module 2 min read - Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
July 20, 2017 Samba Vulnerability Exposes NAS Devices to SHELLBIND Malware 2 min read - The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
July 17, 2017 Everlasting Issue? EternalBlue Scanning Apps Find 50,000 Susceptible Systems 2 min read - A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.
Network July 14, 2017 The Limits of Linguistic Analysis for Security Attribution 2 min read - Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
Data Protection July 13, 2017 Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far 4 min read - Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
Fraud Protection July 13, 2017 Is Blockchain the Key to Stopping Ransomware Attacks? 2 min read - Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack.
Malware June 27, 2017 Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe 6 min read - It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.