Threat Intelligence August 22, 2018 What’s In a (Threat Intelligence) Name? 8 min read - A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.
Malware August 22, 2018 BackSwap Malware Now Targets Six Banks in Spain 3 min read - IBM X-Force researchers discovered that BackSwap, a banking Trojan that had previously only targeted Polish banks, now has its sights set on six banks in Spain.
August 16, 2018 New Ransomware Attacks Use Powerful Encryption to Impede Analysis and Evade Detection 2 min read - New ransomware attacks from GandCrab suggest that the authors are moving quickly to improve its ability to evade detection and impede analysis by security researchers.
August 15, 2018 Dangerous New ATM Fraud Scheme Attacks Dual Fronts Simultaneously 2 min read - Researchers discovered a new ATM fraud scheme that attacks both the front and back ends of ATM networks virtually, making it harder to remediate than traditional schemes that target physical machines.
Incident Response August 14, 2018 How Mike Barcomb’s Military Mindset Enhances Incident Response 4 min read - IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.
Threat Intelligence August 9, 2018 How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 7 min read - Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
Intelligence & Analytics August 8, 2018 IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training 3 min read - As the cybersecurity industry is challenged with a growing skills gap, IBM and CASY are offering cybersecurity training for veterans through the Veterans Accelerator program.
Intelligence & Analytics August 6, 2018 7 Ways to Identify Darknet Cybersecurity Risks 5 min read - Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.
Threat Intelligence August 1, 2018 How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 6 min read - An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
July 30, 2018 Threat Actors Breach Consumer Devices to Build IoT Botnets 2 min read - Security researchers identified two new threats in the wild that are designed to compromise consumer devices to build IoT botnets.