Malware October 25, 2017 Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks 5 min read - Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
Threat Intelligence October 25, 2017 Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry 2 min read - An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
October 24, 2017 There’s No Place Like Home: IBM Security Rejoins the IBM Middleware Community 2 min read - We are happy to announce that IBM Security is back and part of our IBM Middleware Community. The Security team will provide peer-to-peer support.
October 19, 2017 Secure Your Endpoints With QRadar Content for Sysmon 3 min read - IBM QRadar Content for Sysmon enables security teams to detect advanced threats such as WannaCry as well as older, tried-and-true endpoint attacks.
Malware October 16, 2017 Diving Into Zberp’s Unconventional Process Injection Technique 8 min read - IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.
Malware October 11, 2017 TrickBot Takes to Latin America, Continues to Expand Its Global Reach 4 min read - The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.
Risk Management October 3, 2017 Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program 5 min read - Security professionals can leverage freely available, open source security tools to protect their environments from threats.
October 2, 2017 As Cybersecurity Awareness Increases, Information Sharing Lags, Survey Shows 2 min read - Although more than three-quarters of company directors reported a rise in cybersecurity awareness, only one-quarter actively share threat information.
Threat Intelligence September 27, 2017 Put Threat Intelligence Into Action With Security Apps 2 min read - An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.
Fraud Protection September 18, 2017 Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise 7 min read - Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.