Malware May 25, 2017 Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? 6 min read - IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Fraud Protection May 23, 2017 Cybercrime Has Become a Commodity 2 min read - Cybercrime tools available through private networks and on the Dark Web make it easier than ever for would-be fraudsters to infiltrate networks.
May 10, 2017 Fatboy Ransomware Targets Users With Big Mac Index 2 min read - Fatboy ransomware recently added location-based pricing along with extra service for cybercriminals looking for ransomware-as-a-service.
April 26, 2017 Stealthy Remote Access Trojan Resurfaces 2 min read - A remote access Trojan remained undetected for several years due to its unconventional operating methods. Here's what to know about the Cardinal RAT.
April 25, 2017 Stuxnet: The Computer Worm That Keeps on Living 2 min read - Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
Malware April 24, 2017 The Necurs Botnet: A Pandora’s Box of Malicious Spam 11 min read - Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
April 10, 2017 Brick House? New Malware Destroys Vulnerable IoT Devices 2 min read - Iot devices are now under threat from a new strain of malware. BrickerBot infects vulnerable Linus-based endpoints and makes them permanently unusable.
Advanced Threats April 10, 2017 Andromeda: A Galaxy of Pain, Coming to a Machine Near You 4 min read - The IBM X-Force team analyzed the Andromeda malware and determined that its operators have shifted their attention to the payment card industry.
April 3, 2017 Malware Attack Targets Open Source Developers 2 min read - A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
Threat Hunting March 21, 2017 Understanding Cyber Threat Hunting 3 min read - When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.