Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.
CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.
A brand -ew advanced banking Trojan discovered in the wild has been named Shifu by IBM Security X-Force, after the Japanese word for thief.
IBM Security X-Force researchers recently discovered CoreBot, a seemingly generic malware that actually operates on a highly sophisticated level.
The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.