My IBM Log in Subscribe
IBM X-Force

IBM X-Force

Explore the latest on critical threats, vulnerabilities and incident response to help strengthen your offensive and defensive security practices — curated by X-Force’s team of hackers, responders and researchers.
Cloud Think Hub Banner

28 April 2025

News

IBM X-Force Red releases m-Ray, an open-source mainframe vulnerability scanner

Kyri Lea and Elizabeth Christensen have developed m-Ray, an automated vulnerability scanner for IBM mainframes running the z/OS operating system.

22 April 2025

Powering up: Abusing Power Apps to compromise on-prem servers

The X-Force Red team was able to breach a hardened external perimeter and gain code execution to an on-premises SQL server, resulting in full Active Directory compromise. Learn how they did it, and...

17 April 2025

X-Force Threat Intelligence Index 2025 highlights attackers steal, and sell, user identities at scale

The 2025 X-Force Threat Intelligence Index is out, and it shows that attackers are still actively stealing and selling user identities. Learn more about that and other relevant threats.

15 April 2025

News

IBM X-Force Threat Analysis: Hive0148 observed targeting Mexico and Costa Rica

IBM X-Force observed Hive0148 spreading the Grandoreiro banking trojan to users in Mexico and Costa Rica. Learn more about this phishing and Malware-as-a-Service campaign.

8 April 2025

News

RemoteMonologue: Weaponizing DCOM for NTLM authentication coercions

The IBM X-Force Red team covers the fundamentals of COM and DCOM, dives into the RunAs setting and why authentication coercions are impactful and introduces a new credential harvesting tool - Remot...

25 March 2025

News

IBM X-Force discovers new Sheriff Backdoor used to target Ukraine

IBM X-Force discovered a set of previously unknown malware used in a cyber espionage attack against an entity within Ukraine’s defense sector in the first half of 2024. Unpack the analysis.

25 March 2025

News

Fileless lateral movement with trapped COM objects

New research from IBM X-Force Red has led to the development of a proof-of-concept fileless lateral movement technique by abusing trapped Component Object Model (COM) objects. Get the details.

18 March 2025

News

Bypassing Windows Defender Application Control with Loki C2

Microsoft offers a bug bounty for qualifying bypasses into Windows Defender Application Control. Learn how IBM's X-Force team found a bypass using Loki C2.

4 March 2025

News

FYSA: VMware Critical Vulnerabilities Patched

Broadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise.

21 February 2025

News

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.

14 February 2025

News

Smoltalk: RCE in open source agents

Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn mo...

17 January 2025

News

Being a good CLR host – Modernizing offensive .NET tradecraft

Learn how red teams can modernize their use of .NET assemblies using CLR customizations.

13 January 2025

News

Insights from CISA’s red team findings and the evolution of EDR

A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity.

6 January 2025

News

Abusing MLOps platforms to compromise ML models and enterprise data lakes

With the rush to implement AI across organizations came the increase in the use of MLOps platforms and a greater risk of attack. Learn more about MLOps platforms and how threat actors are using them.

30 December 2024

News

DHS: Guidance for AI in Critical Infrastructure

At the end of 2024, we've reached a moment in AI development where government involvement can help shape the trajectory of this pervasive technology.

No results found