Data Protection April 13, 2017 Life’s a Breach: Dissecting a Year of Devastating Data Breaches 2 min read - The volume and sophistication of data breaches grew dramatically in 2016 as cybercriminals began targeting unstructured data for the first time.
Advanced Threats April 10, 2017 Andromeda: A Galaxy of Pain, Coming to a Machine Near You 4 min read - The IBM X-Force team analyzed the Andromeda malware and determined that its operators have shifted their attention to the payment card industry.
Threat Intelligence April 10, 2017 Use Email to Manage Threat Intelligence Collections 2 min read - The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.
Risk Management April 7, 2017 Do Threat Intelligence Exchanges Really Work? 2 min read - Threat intelligence exchanges enable companies to detect and respond to incidents more effectively, but only if they take the necessary steps to prepare.
Advanced Threats April 6, 2017 The Weaponization of IoT: Rise of the Thingbots 2 min read - The IBM X-Force team tracked the weaponization of IoT devices and found that the threat of so-called thingbots increased dramatically in 2016.
Malware March 29, 2017 Commercial Malware Makes a Comeback in 2016 8 min read - According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.
Threat Intelligence March 29, 2017 2016: The Year of the Mega Breach 2 min read - The latest edition of the IBM X-Force Threat Intelligence Index detailed how companies were affected by data breaches during the "year of the mega breach."
Malware March 28, 2017 The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak 4 min read - After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
Advanced Threats March 27, 2017 CAPEC: Making Heads or Tails of Attack Patterns 6 min read - The CAPEC standard for attack categorization enables analysts to more efficiently classify, prioritize and communicate about common threats and events.
March 20, 2017 Unraveling GootKit’s Stealth Loader 2 min read - GootKit is an ongoing malware project that affects the three most popular browsers: Internet Explorer, Mozilla Firefox and Google Chrome.