Malware May 4, 2017 Neverquest Gang Takes Leave — Is It the End of the Quest? 5 min read - IBM X-Force researchers recently observed a massive drop in Neverquest malware campaigns. Is it the end of an era for this Trojan?
May 2, 2017 New Mac Malware Targets User Communications 2 min read - A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
Malware April 11, 2017 Brazilian Malware Never Sleeps: Meet EmbusteBot 5 min read - IBM Research — Haifa Labs detected yet another malware campaign, dubbed EmbusteBot, designed to target dozens of financial institutions in Brazil.
Advanced Threats April 10, 2017 Mirai IoT Botnet: Mining for Bitcoins? 4 min read - Just in time for IoT Day, the Mirai botnet is launching attacks with a new trick up its sleeve: a built-in bitcoin mining component.
April 4, 2017 Security Tools Must Adapt to Fileless, Nonmalware Attacks 2 min read - An attack doesn't need a special file to be malicious; it can use previously existing system structures, prompting the need for new security tools.
Malware March 29, 2017 Commercial Malware Makes a Comeback in 2016 8 min read - According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.
March 27, 2017 ICS Infections Are Fewer Than Previously Thought 2 min read - Recent research from the firm Dragos has shed some light on the actual number malware infections affecting industrial control systems (ICS).
March 24, 2017 It’s a Wild, Wild Word: New Macro Malware Now Infecting Both Windows and MacOS 2 min read - New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.
Malware March 17, 2017 Churn Under the Surface of Global Cybercrime 2 min read - Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.
Malware March 1, 2017 GootKit Developers Dress It Up With Web Traffic Proxy 6 min read - X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.