Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
Malware October 2, 2015 UK Banks Hit With New Zeus Sphinx Variant and Renewed Kronos Banking Trojan Attacks 6 min read - IBM Security X-Force researchers have discovered instances of the Kronos banking Trojan and Zeus Sphinx malware being used by cybercriminals in the wild.
Malware September 28, 2015 Shifu Officially Spreads to the UK: Banks and Wealth Management Firms Beware 2 min read - The Shifu banking Trojan has gone through yet another rejuvenation, this time transforming to target banks and wealth management firms in the U.K.
Intelligence & Analytics September 16, 2015 Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough 5 min read - Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.
Malware September 10, 2015 An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware 6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
Threat Intelligence September 9, 2015 Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity 10 min read - IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
Software Vulnerabilities September 8, 2015 Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look 3 min read - The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
Malware September 4, 2015 An Example of Common String and Payload Obfuscation Techniques in Malware 9 min read - IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Malware September 1, 2015 The Myth of the Obvious Malware 4 min read - Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.
Advanced Threats August 31, 2015 Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks 7 min read - A brand -ew advanced banking Trojan discovered in the wild has been named Shifu by IBM Security X-Force, after the Japanese word for thief.