Network November 16, 2017 New Quad9 DNS Service Makes the Internet Safer and More Private 3 min read - Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.
Incident Response November 13, 2017 The Ugly Duckling’s Security Testing Transformation 2 min read - Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.
Malware November 13, 2017 New Banking Trojan IcedID Discovered by IBM X-Force Research 7 min read - IBM X-Force identified a new Trojan, dubbed IcedID, that uses advanced browser manipulation tactics to target financial institutions in the U.S. and U.K.
Malware November 8, 2017 Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection 6 min read - IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
Advanced Threats November 2, 2017 Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening 2 min read - They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
Malware October 26, 2017 Ursnif Campaign Waves Breaking on Japanese Shores 5 min read - The Ursnif banking Trojan began targeting financial institutions in Japan during Q3 2017 and continues to operate in the region as we enter Q4.
Malware October 25, 2017 Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks 5 min read - Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
Threat Intelligence October 25, 2017 Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry 2 min read - An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
X-Force October 17, 2017 Practice: The Best Defense for Responding to Cyber Incidents 2 min read - When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.
Malware October 16, 2017 Diving Into Zberp’s Unconventional Process Injection Technique 8 min read - IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.