Software Vulnerabilities September 8, 2015 Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look 3 min read - The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
Malware September 1, 2015 The Myth of the Obvious Malware 4 min read - Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.
Malware August 28, 2015 Watch Out for CoreBot, New Stealer in the Wild 5 min read - IBM Security X-Force researchers recently discovered CoreBot, a seemingly generic malware that actually operates on a highly sophisticated level.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?
Intelligence & Analytics August 26, 2015 Preparing for the Global Era of Cybercrime 2 min read - The global era of cybercrime is upon us, and it's drastically changing the way organizations approach their cybersecurity strategies.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
X-Force August 24, 2015 Anonymity and Cryptocurrencies Enabling High-Stakes Extortion 3 min read - The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
Threat Intelligence August 20, 2015 Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing 5 min read - Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.